An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144.
2021-03-10T18:15:13.297
2024-11-21T06:20:48.203
Modified
CVSSv3.1: 5.1 (MEDIUM)
AV:L/AC:L/Au:N/C:P/I:P/A:N
3.9
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | paloaltonetworks | cortex_xsoar | 5.5.0 | Yes |
Application | paloaltonetworks | cortex_xsoar | 5.5.0 | Yes |
Application | paloaltonetworks | cortex_xsoar | 5.5.0 | Yes |
Application | paloaltonetworks | cortex_xsoar | 5.5.0 | Yes |
Application | paloaltonetworks | cortex_xsoar | 5.5.0 | Yes |
Application | paloaltonetworks | cortex_xsoar | 5.5.0 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.0.1 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.0.1 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.0.2 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.0.2 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.0.2 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.0.2 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.0.2 | Yes |
Application | paloaltonetworks | cortex_xsoar | 6.1.0 | Yes |