Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-39351


Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.6.0, performing an API request using a valid API key with insufficient permissions causes the API key to be written to Dependency-Track's audit log in clear text. Actors with access to the audit log can exploit this flaw to gain access to valid API keys. The issue has been fixed in Dependency-Track 4.6.0. Instead of logging the entire API key, only the last 4 characters of the key will be logged. It is strongly recommended to check historic logs for occurrences of this behavior, and re-generating API keys in case of leakage.


Published

2022-10-25T17:15:56.613

Last Modified

2024-11-21T07:18:05.790

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.4 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-312
  • Type: Primary
    CWE-312

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application owasp dependency-track < 4.6.0 Yes

References