Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rpq8-q44m-2rpg

Опубликовано: 09 апр. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.7

Описание

Microsoft Identity Web Exposes Client Secrets and Certificate Information in Service Logs

Impact

What kind of vulnerability is it? Who is impacted?

Description: This vulnerability affects confidential client applications, including daemons, web apps, and web APIs. Under specific circumstances, sensitive information such as client secrets or certificate details may be exposed in the service logs of these applications. Service logs are intended to be handled securely.

Impact: The vulnerability impacts service logs that meet the following criteria:

  • Logging Level: Logs are generated at the information level.
  • Credential Descriptions: containing:
    • Local file paths with passwords.
    • Base64 encoded values.
    • Client secret.

Additionally, logs of services using Base64 encoded certificates or certificate paths with password credential descriptions are also affected if the certificates are invalid or expired, regardless of the log level. Note that these credentials are not usable due to their invalid or expired status.

If your service logs are handled securely, you are not impacted.

Otherwise, the following table shows when you can be impacted

 Log Level Information for Microsoft.Identity.WebInvalid Certificate
One of the ClientCredentials credential description has a CredentialSource = Base64Encoded or (CredentialSource = Path)ImpactedImpacted
One of the ClientCredentials credential description is a Client secret (CredentialSource = ClientSecret)ImpactedNot impacted
Other credential descriptionsNot ImpactedNot Impacted

Patches

Has the problem been patched? What versions should users upgrade to? To mitigate this vulnerability, update to Microsoft.Identity.Web 3.8.2 or Microsoft.Identity.Abstractions 9.0.0.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading? You can work around the issue in the following ways:

  • Ensure that service logs are handled securely and access to logs is restricted

  • Don’t use LogLevel = Information for the Microsoft.Identity.Web namespace

Recommendation for production environment

Avoid using ClientCredentials with CredentialDescriptions which CredentialSource is ClientSecret, or Base64Encoded, or Path. Rather use certificate from KeyVault or a certificate store, or Federation identity credential with Managed identity.

References

Are there any links users can visit to find out more?

Пакеты

Наименование

Microsoft.Identity.Web

nuget
Затронутые версииВерсия исправления

>= 3.2.0, < 3.8.2

3.8.2

Наименование

Microsoft.Identity.Abstractions

nuget
Затронутые версииВерсия исправления

>= 7.1.0, < 9.0.0

9.0.0

EPSS

Процентиль: 12%
0.00039
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-532

Связанные уязвимости

CVSS3: 4.7
nvd
10 месяцев назад

Microsoft Identity Web is a library which contains a set of reusable classes used in conjunction with ASP.NET Core for integrating with the Microsoft identity platform (formerly Azure AD v2.0 endpoint) and AAD B2C. This vulnerability affects confidential client applications, including daemons, web apps, and web APIs. Under specific circumstances, sensitive information such as client secrets or certificate details may be exposed in the service logs of these applications. Service logs are intended to be handled securely. Service logs generated at the information level or credential descriptions containing local file paths with passwords, Base64 encoded values, or Client secret. Additionally, logs of services using Base64 encoded certificates or certificate paths with password credential descriptions are also affected if the certificates are invalid or expired, regardless of the log level. Note that these credentials are not usable due to their invalid or expired status. To mitigate this

CVSS3: 4.7
fstec
10 месяцев назад

Уязвимость компонента Microsoft.Identity.Abstractions библиотеки Microsoft Identity Web, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 12%
0.00039
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-532