CVE-2024-38460

In SonarQube before 10.4 and 9.9.4 LTA, encrypted values generated using the Settings Encryption feature are potentially exposed in cleartext as part of the URL parameters in the logs (such as SonarQube Access Logs, Proxy Logs, etc).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:*
cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:*

History

07 Aug 2024, 18:58

Type Values Removed Values Added
References () https://community.sonarsource.com/t/sonarqube-ce-10-3-0-leaking-encrypted-values-in-web-server-logs/108187 - () https://community.sonarsource.com/t/sonarqube-ce-10-3-0-leaking-encrypted-values-in-web-server-logs/108187 - Exploit, Issue Tracking, Vendor Advisory
References () https://sonarsource.atlassian.net/browse/SONAR-21559 - () https://sonarsource.atlassian.net/browse/SONAR-21559 - Issue Tracking
First Time Sonarsource sonarqube
Sonarsource
CPE cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-532

16 Jun 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-16 15:15

Updated : 2025-03-13 15:15


NVD link : CVE-2024-38460

Mitre link : CVE-2024-38460


JSON object : View

Products Affected

sonarsource

  • sonarqube
CWE
CWE-532

Insertion of Sensitive Information into Log File