Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-25284

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-27 Feb, 2021 | 00:00
Updated At-03 Aug, 2024 | 19:56
Rejected At-
Credits

An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:27 Feb, 2021 | 00:00
Updated At:03 Aug, 2024 | 19:56
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/saltstack/salt/releases
N/A
https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
vendor-advisory
https://security.gentoo.org/glsa/202103-01
vendor-advisory
https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
mailing-list
https://www.debian.org/security/2021/dsa-5011
vendor-advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html
mailing-list
https://security.gentoo.org/glsa/202310-22
vendor-advisory
Hyperlink: https://github.com/saltstack/salt/releases
Resource: N/A
Hyperlink: https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
Resource:
vendor-advisory
Hyperlink: https://security.gentoo.org/glsa/202103-01
Resource:
vendor-advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
Resource:
mailing-list
Hyperlink: https://www.debian.org/security/2021/dsa-5011
Resource:
vendor-advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html
Resource:
mailing-list
Hyperlink: https://security.gentoo.org/glsa/202310-22
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/saltstack/salt/releases
x_transferred
https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
vendor-advisory
x_transferred
https://security.gentoo.org/glsa/202103-01
vendor-advisory
x_transferred
https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
mailing-list
x_transferred
https://www.debian.org/security/2021/dsa-5011
vendor-advisory
x_transferred
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html
mailing-list
x_transferred
https://security.gentoo.org/glsa/202310-22
vendor-advisory
x_transferred
Hyperlink: https://github.com/saltstack/salt/releases
Resource:
x_transferred
Hyperlink: https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202103-01
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
Resource:
mailing-list
x_transferred
Hyperlink: https://www.debian.org/security/2021/dsa-5011
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html
Resource:
mailing-list
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202310-22
Resource:
vendor-advisory
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:27 Feb, 2021 | 05:15
Updated At:21 Dec, 2023 | 18:23

An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

saltstack
saltstack
>>salt>>Versions before 2015.8.10(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2015.8.11(inclusive) to 2015.8.13(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2016.3.0(inclusive) to 2016.3.4(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2016.3.5(inclusive) to 2016.3.6(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2016.3.7(inclusive) to 2016.3.8(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2016.3.9(inclusive) to 2016.11.3(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2016.11.4(inclusive) to 2016.11.5(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2016.11.7(inclusive) to 2016.11.10(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2017.5.0(inclusive) to 2017.7.8(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2018.2.0(inclusive) to 2018.3.5(inclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2019.2.0(inclusive) to 2019.2.5(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 2019.2.6(inclusive) to 2019.2.8(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 3000(inclusive) to 3000.6(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 3001(inclusive) to 3001.4(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>Versions from 3002(inclusive) to 3002.5(exclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>32
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>33
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>34
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>9.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>11.0
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-522Primarynvd@nist.gov
CWE-532Primarynvd@nist.gov
CWE ID: CWE-522
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-532
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/saltstack/salt/releasescve@mitre.org
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/11/msg00009.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/cve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/cve@mitre.org
Mailing List
Third Party Advisory
https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/cve@mitre.org
Vendor Advisory
https://security.gentoo.org/glsa/202103-01cve@mitre.org
Third Party Advisory
https://security.gentoo.org/glsa/202310-22cve@mitre.org
Third Party Advisory
https://www.debian.org/security/2021/dsa-5011cve@mitre.org
Third Party Advisory
Hyperlink: https://github.com/saltstack/salt/releases
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://security.gentoo.org/glsa/202103-01
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202310-22
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2021/dsa-5011
Source: cve@mitre.org
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

55Records found

CVE-2017-9271
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
CVSS Score-4||MEDIUM
EPSS-0.14% / 34.74%
||
7 Day CHG~0.00%
Published-01 Mar, 2018 | 19:00
Updated-16 Sep, 2024 | 23:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
proxy credentials written to log files by zypper

The commandline package update tool zypper writes HTTP proxy credentials into its logfile, allowing local attackers to gain access to proxies used.

Action-Not Available
Vendor-Fedora ProjectopenSUSESUSE
Product-fedorazypperzypper
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2017-15572
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.58% / 67.99%
||
7 Day CHG~0.00%
Published-18 Oct, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Redmine before 3.2.6 and 3.3.x before 3.3.3, remote attackers can obtain sensitive information (password reset tokens) by reading a Referer log, because account/lost_password does not use a redirect.

Action-Not Available
Vendor-redminen/aDebian GNU/Linux
Product-debian_linuxredminen/a
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2011-1943
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.04% / 11.83%
||
7 Day CHG~0.00%
Published-14 Jun, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.

Action-Not Available
Vendor-n/aFedora ProjectThe GNOME Project
Product-networkmanagerfedoran/a
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2020-5260
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-27.36% / 96.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 22:50
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
malicious URLs may cause Git to present stored credentials to the wrong server

Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.

Action-Not Available
Vendor-git-scmgitgitCanonical Ltd.openSUSEFedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoragitleapgit
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-8152
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-4.4||MEDIUM
EPSS-0.11% / 30.70%
||
7 Day CHG~0.00%
Published-16 Nov, 2020 | 00:36
Updated-04 Aug, 2024 | 09:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.

Action-Not Available
Vendor-n/aNextcloud GmbH
Product-nextcloud_serverNextcloud Server
CWE ID-CWE-522
Insufficiently Protected Credentials
  • Previous
  • 1
  • 2
  • Next
Details not found