Debezium UI 2.5 Credential Disclosure
2024-5-25 04:58:41 Author: cxsecurity.com(查看原文) 阅读量:8 收藏

# Exploit Title: Debezium UI - Credential Leakage # Google Dork: N/A # Date: [2024-03-11] # Exploit Author: Ihsan Cetin, Hamza Kaya Toprak # Vendor Homepage: https://debezium.io/ # Software Link: N/A # Version: < 2.5 (REQUIRED) # Tested on: [N/A] # CVE : CVE-2024-28736 Proof of concept: # Details #Debezium-ui (version 2.5) is vulnerable to a password exposure issue that could allow an attacker to retrieve sensitive credentials in plaintext format. # PoC : #Unmasked Password in Connector Configuration: When navigating to the connectors section within the application's connector screen, the password field, which should ideally be masked for security purposes, is briefly displayed in plaintext format during the initial seconds. # Plaintext Password Retrieval via API Endpoint: By accessing the URL http://10.0.15.51:8080//api/connectors/1/account-activity/config #and searching for the database.password parameter, an attacker can retrieve the database password in plaintext format without any authentication.



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2024050075
如有侵权请联系:admin#unsafe.sh