CVE-2024-3165 Vulnerability Details

  /     /     /  

CVE-2024-3165 Metadata Quick Info

CVE Published: 01/04/2024 | CVE Updated: 30/09/2024 | CVE Year: 2024
Source: dotCMS | Vendor: dotCMS | Product: dotCMS core
Status : PUBLISHED

CVE-2024-3165 Description

System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment.   OWASP Top 10 - A05) Insecure Design OWASP Top 10 - A05) Security Misconfiguration OWASP Top 10 - A09) Security Logging and Monitoring Failure

Metrics

CVSS Version: 3.1 | Base Score: 4.5 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* HIGH
    User Interaction (UI)* REQUIRED
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* NONE
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-532
CWE Name: CWE-532 Insertion of Sensitive Information into Log File
Source: dotCMS

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-131
CAPEC Description: CAPEC-131 Resource Leak Exposure


Source: NVD (National Vulnerability Database).