Skip to content

There is a risk of sensitive information leakage in the user information acquisition of CloudExplorer Lite

Moderate
baixin513 published GHSA-hh2g-77xq-x4vq Aug 24, 2023

Package

maven com.fit2cloud (Maven)

Affected versions

versions: < = 1.3.1

Patched versions

1.4.0

Description

Impact

There is a risk of sensitive information leakage in the user information acquisition of CloudExplorer Lite.

The reproduction steps are as follows:

1.Using the system administrator account to log in, the following interface returns information about all users in the current system, including the password md5: https://cloudexplorer-lite-demo.fit2cloud.com/management-center/api/user/page?currentPage=1&pageSize=1
image

2.Using the MD5 library to search, you can find the plaintext passwords of some users.

Expected processing logic:

stay https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/blob/main/framework/management-center/backend/src/main/java/com/fit2cloud/controller/UserController.java Although the listUser interface has been set as read-only permission, there should be restrictions on returning data and sensitive credential information such as passwords cannot be returned, resulting in the risk of losing control of permissions.
image

Affected versions: <= 1.4.0.

Patches

The vulnerability has been fixed in v1.4.0.

Workarounds

It is recommended to upgrade the version to v1.4.0.

References

If you have any questions or comments about this advisory:

Open an issue in https://github.com/CloudExplorer-Dev/CloudExplorer-Lite
Email us at xin.bai@fit2cloud.com

Severity

Moderate

CVE ID

CVE-2023-39519

Weaknesses

Credits