CVE-2023-4509

It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

02 Jul 2025, 18:09

Type Values Removed Values Added
CPE cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
References () https://advisories.octopus.com/post/2024/sa2024-02/ - () https://advisories.octopus.com/post/2024/sa2024-02/ - Vendor Advisory
First Time Linux linux Kernel
Microsoft
Linux
Microsoft windows
Octopus
Octopus octopus Server

21 Nov 2024, 08:35

Type Values Removed Values Added
References () https://advisories.octopus.com/post/2024/sa2024-02/ - () https://advisories.octopus.com/post/2024/sa2024-02/ -

07 Nov 2024, 17:35

Type Values Removed Values Added
CWE CWE-319

18 Apr 2024, 13:04

Type Values Removed Values Added
Summary
  • (es) Es posible que una clave API se registre en texto plano en el archivo de registro de auditoría después de un intento de inicio de sesión no válido.

18 Apr 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-18 00:15

Updated : 2025-07-02 18:09


NVD link : CVE-2023-4509

Mitre link : CVE-2023-4509

CVE.ORG link : CVE-2023-4509


JSON object : View

Products Affected

linux

  • linux_kernel

octopus

  • octopus_server

microsoft

  • windows
CWE
CWE-319

Cleartext Transmission of Sensitive Information