CVE-2023-0436

Severity CVSS v4.0:
Pending analysis
Type:
CWE-532 Information Exposure Through Log Files
Publication date:
07/11/2023
Last modified:
14/11/2023

Description

The affected versions of MongoDB Atlas Kubernetes Operator may print sensitive information like GCP service account keys and API integration secrets while DEBUG mode logging is enabled. This issue affects MongoDB Atlas Kubernetes Operator versions: 1.5.0, 1.6.0, 1.6.1, 1.7.0.<br /> <br /> Please note that this is reported on an EOL version of the product, and users are advised to upgrade to the latest supported version.<br /> Required Configuration: <br /> <br /> DEBUG logging is not enabled by default, and must be configured by the end-user. To check the log-level of the Operator, review the flags passed in your deployment configuration (eg. https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 )<br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:mongodb:atlas_kubernetes_operator:*:*:*:*:*:*:*:* 1.6.0 (including) 1.7.1 (excluding)
cpe:2.3:a:mongodb:atlas_kubernetes_operator:1.5.0:*:*:*:*:*:*:*