Bug 2255204 (CVE-2023-6944)

Summary: CVE-2023-6944 RHDH: catalog-import function leaks credentials to frontend
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jchui, ktsao, nboldt, rkeshri, rtaniwa, security-response-team, tkral
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: rhdh 1.21.0 Doc Type: ---
Doc Text:
A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2255205    

Description Mauro Matteo Cascella 2023-12-19 10:23:14 UTC
A flaw was found in Red Hat Developer Hub (RHDH) in the catalog-import function. The vulnerability is that the catalog-import function leaks GitLab access tokens on the frontend. This leakage occurs when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error displayed on the frontend inadvertently includes the raw access token, which should never be exposed to frontend users.

The impact of this vulnerability is significant. An attacker, upon gaining access to this token, could potentially execute a range of malicious activities depending on the token's permissions. These activities could include pushing malicious code to repositories, deleting resources in Git, revoking or generating new keys, or even signing code illegitimately.

Comment 2 Mauro Matteo Cascella 2023-12-19 10:25:04 UTC
Red Hat Product Security would like to thank Josephine Pfeiffer for reporting this issue.

Comment 5 Mauro Matteo Cascella 2024-02-01 10:11:15 UTC
*** Bug 2260001 has been marked as a duplicate of this bug. ***