Prisma Cloud Compute: User role authorization secret for Console leaked through log file export
CVE-2021-3039
3.8LOW
Key Information:
- Vendor
- Palo Alto Networks
- Status
- Vendor
- CVE Published:
- 9 June 2021
Badges
👾 Exploit Exists
Summary
An information exposure through log file vulnerability exists in the Palo Alto Networks Prisma Cloud Compute Console where a secret used to authorize the role of the authenticated user is logged to a debug log file. Authenticated Operator role and Auditor role users with access to the debug log files can use this secret to gain Administrator role access for their active session in Prisma Cloud Compute. Prisma Cloud Compute SaaS versions were automatically upgraded to the fixed release. This issue impacts all Prisma Cloud Compute versions earlier than Prisma Cloud Compute 21.04.412.
Affected Version(s)
Prisma Cloud Compute 20.04 < 21.04.412
References
CVSS V3.1
Score:
3.8
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Palo Alto Networks thanks Jakub Palaczynski for discovering and reporting this issue.