In SonarQube before 10.4 and 9.9.4 LTA, encrypted values generated using the Settings Encryption feature are potentially exposed in cleartext as part of the URL parameters in the logs (such as SonarQube Access Logs, Proxy Logs, etc).
References
Link | Resource |
---|---|
https://community.sonarsource.com/t/sonarqube-ce-10-3-0-leaking-encrypted-values-in-web-server-logs/108187 | Exploit Issue Tracking Vendor Advisory |
https://sonarsource.atlassian.net/browse/SONAR-21559 | Issue Tracking |
https://community.sonarsource.com/t/sonarqube-ce-10-3-0-leaking-encrypted-values-in-web-server-logs/108187 | Exploit Issue Tracking Vendor Advisory |
https://sonarsource.atlassian.net/browse/SONAR-21559 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-06-16 15:15
Updated : 2025-03-13 15:15
NVD link : CVE-2024-38460
Mitre link : CVE-2024-38460
CVE.ORG link : CVE-2024-38460
JSON object : View
Products Affected
sonarsource
- sonarqube
CWE
CWE-532
Insertion of Sensitive Information into Log File