Debezium UI 2.5 Credential Disclosure
2024-5-24 22:53:59 Author: packetstormsecurity.com(查看原文) 阅读量:0 收藏

# Exploit Title: Debezium UI - Credential Leakage

# Google Dork: N/A

# Date: [2024-03-11]

# Exploit Author: Ihsan Cetin, Hamza Kaya Toprak

# Vendor Homepage: https://debezium.io/

# Software Link: N/A

# Version: < 2.5 (REQUIRED)

# Tested on: [N/A]

# CVE : CVE-2024-28736

Proof of concept:

# Details

#Debezium-ui (version 2.5) is vulnerable to a password exposure issue that could allow an attacker to retrieve sensitive credentials in plaintext format.

# PoC :

#Unmasked Password in Connector Configuration: When navigating to the connectors section within the application's connector screen, the password field, which should ideally be masked for security purposes, is briefly displayed in plaintext format during the initial seconds.

# Plaintext Password Retrieval via API Endpoint: By accessing the URL

http://10.0.15.51:8080//api/connectors/1/account-activity/config

#and searching for the database.password parameter, an attacker can retrieve the database password in plaintext format without any authentication.


文章来源: https://packetstormsecurity.com/files/178794/debeziumui25-disclose.txt
如有侵权请联系:admin#unsafe.sh