FKIE_CVE-2021-3034
Vulnerability from fkie_nvd - Published: 2021-03-10 18:15 - Updated: 2024-11-21 06:20
Severity ?
Summary
An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| paloaltonetworks | cortex_xsoar | 5.5.0 | |
| paloaltonetworks | cortex_xsoar | 5.5.0 | |
| paloaltonetworks | cortex_xsoar | 5.5.0 | |
| paloaltonetworks | cortex_xsoar | 5.5.0 | |
| paloaltonetworks | cortex_xsoar | 5.5.0 | |
| paloaltonetworks | cortex_xsoar | 5.5.0 | |
| paloaltonetworks | cortex_xsoar | 6.0.1 | |
| paloaltonetworks | cortex_xsoar | 6.0.1 | |
| paloaltonetworks | cortex_xsoar | 6.0.2 | |
| paloaltonetworks | cortex_xsoar | 6.0.2 | |
| paloaltonetworks | cortex_xsoar | 6.0.2 | |
| paloaltonetworks | cortex_xsoar | 6.0.2 | |
| paloaltonetworks | cortex_xsoar | 6.0.2 | |
| paloaltonetworks | cortex_xsoar | 6.1.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76B47510-C747-4A91-8120-CBD872DDE5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:5.5.0:70066:*:*:*:*:*:*",
"matchCriteriaId": "CCC73F19-BAEC-464E-813E-AABFB0FF1749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:5.5.0:73387:*:*:*:*:*:*",
"matchCriteriaId": "829FDD7F-9F92-4425-BA03-7A916C672A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:5.5.0:75211:*:*:*:*:*:*",
"matchCriteriaId": "01F6E4B3-7264-4B6B-A2E0-EC0C6E454FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:5.5.0:78518:*:*:*:*:*:*",
"matchCriteriaId": "BFF634F2-427F-46AF-A203-3F8F91AEB039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:5.5.0:94592:*:*:*:*:*:*",
"matchCriteriaId": "C1B47446-7E43-44ED-A734-4C300ED6F6CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E09D6E6D-586A-4034-A5ED-6669EECE4715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.0.1:81077:*:*:*:*:*:*",
"matchCriteriaId": "4F60A667-2802-4EE5-879D-DEF385C8A252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FDAAC395-8A8B-4058-AEC8-450DA13E4D5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.0.2:90947:*:*:*:*:*:*",
"matchCriteriaId": "5617A797-C295-4534-A8BD-DB7637FEDDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.0.2:93351:*:*:*:*:*:*",
"matchCriteriaId": "924A87A5-6809-4D3A-B660-4F3D3E930103",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.0.2:94597:*:*:*:*:*:*",
"matchCriteriaId": "B046FAAA-2FC4-4F69-980B-878BA24D1ACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.0.2:97682:*:*:*:*:*:*",
"matchCriteriaId": "231DF541-0D13-42DD-9392-A269999DA50C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "62F98F51-39E4-480D-8DB8-EE5AD36920FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the \u0027/var/log/demisto/\u0027 server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144."
},
{
"lang": "es",
"value": "Se presenta una exposici\u00f3n de la informaci\u00f3n por medio de la vulnerabilidad del archivo de registro en el software Cortex XSOAR donde los secretos configurados para la integraci\u00f3n de inicio de sesi\u00f3n \u00fanico (SSO) SAML pueden ser registrados en los registros del servidor \"/var/log/demisto/\" al probar la integraci\u00f3n durante la instalaci\u00f3n.\u0026#xa0;Esta informaci\u00f3n registrada incluye la clave privada y el certificado del proveedor de identidad utilizado para configurar la integraci\u00f3n SAML SSO.\u0026#xa0;Este problema afecta a: Cortex XSOAR versiones 5.5.0 builds anteriores a 98622;\u0026#xa0;Cortex XSOAR versiones 6.0.1 builds anteriores a 830029;\u0026#xa0;Cortex XSOAR versiones 6.0.2 builds anteriores a 98623;\u0026#xa0;Cortex XSOAR versiones 6.1.0 builds anteriores a 848144"
}
],
"id": "CVE-2021-3034",
"lastModified": "2024-11-21T06:20:48.203",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 4.2,
"source": "psirt@paloaltonetworks.com",
"type": "Secondary"
}
]
},
"published": "2021-03-10T18:15:13.297",
"references": [
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Vendor Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2021-3034"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2021-3034"
}
],
"sourceIdentifier": "psirt@paloaltonetworks.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "psirt@paloaltonetworks.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…