Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp | patch vendor advisory exploit |
https://github.com/nautobot/nautobot/pull/4692 | patch |
https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71 | patch |