Логотип exploitDog
bind:CVE-2023-48700
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-48700

Количество 2

Количество 2

nvd логотип

CVE-2023-48700

около 2 лет назад

The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials.

CVSS3: 5.7
EPSS: Низкий
github логотип

GHSA-qf3c-rw9f-jh7v

около 2 лет назад

Clear Text Credentials Exposed via Onboarding Task

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-48700

The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials.

CVSS3: 5.7
0%
Низкий
около 2 лет назад
github логотип
GHSA-qf3c-rw9f-jh7v

Clear Text Credentials Exposed via Onboarding Task

CVSS3: 5.7
0%
Низкий
около 2 лет назад

Уязвимостей на страницу