Secret logging may occur in debug mode of Atlas Operator
CVE-2023-0436
7.5HIGH
Key Information:
- Vendor
- MongoDB
- Vendor
- CVE Published:
- 7 November 2023
Summary
The MongoDB Atlas Kubernetes Operator has a vulnerability that allows the possibility of exposing sensitive information, including GCP service account keys and API integration secrets, when DEBUG mode logging is enabled. This issue affects specific versions of the operator and occurs due to improper logging configurations that end-users can set. Notably, DEBUG mode must be deliberately enabled by users, as it is not the default setting. For those operating on the affected versions, it is essential to review the deployment configuration and consider upgrading to the latest supported version to maintain security integrity.
Affected Version(s)
MongoDB Atlas Kubernetes Operator 1.5.0 <= 1.7.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved