Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-22481
HistoryMar 06, 2023 - 5:33 p.m.

CVE-2023-22481 Sensitive information exposure in the logs of greader API in FreshRSS

2023-03-0617:33:03
CWE-532
GitHub_M
www.cve.org
2
sensitive information exposure
greader api
freshrss
authentication
logs
syslogs
exploitation
api keys
passwords

CVSS3

4

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

18.5%

FreshRSS is a self-hosted RSS feed aggregator. When using the greader API, the provided password is logged in clear in users/_/log_api.txt in the case where the authentication fails. The issues occurs in authorizationToUser() in greader.php. If there is an issue with the request or the credentials, unauthorized() or badRequest() is called. Both these functions are printing the return of debugInfo() in the logs. debugInfo() will return the content of the request. By default, this will be saved in users/_/log_api.txt and if the const COPY_LOG_TO_SYSLOG is true, in syslogs as well. Exploiting this issue requires having access to logs produced by FreshRSS. Using the information from the logs, a malicious individual could get users’ API keys (would be displayed if the users fills in a bad username) or passwords.

CNA Affected

[
  {
    "vendor": "FreshRSS",
    "product": "FreshRSS",
    "versions": [
      {
        "version": ">= 1.9.0, < 1.21.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

18.5%

Related for CVELIST:CVE-2023-22481