CVE-2024-30896

InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API.
Configurations

No configuration.

History

03 Dec 2024, 21:15

Type Values Removed Values Added
Summary (en) InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. NOTE: the supplier indicates that this is intentional but is a "poor design choice" that will be changed in a future release. (en) InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API.

27 Nov 2024, 17:15

Type Values Removed Values Added
Summary
  • (es) InfluxDB hasta la versión 2.7.10 permite a todos los administradores de Access recuperar todos los tokens sin procesar mediante el comando "influx auth ls". NOTA: el proveedor indica que esto es intencional, pero es una "mala elección de diseño" que se cambiará en una versión futura.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-922

21 Nov 2024, 13:57

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-21 11:15

Updated : 2024-12-03 21:15


NVD link : CVE-2024-30896

Mitre link : CVE-2024-30896

CVE.ORG link : CVE-2024-30896


JSON object : View

Products Affected

No product.

CWE
CWE-922

Insecure Storage of Sensitive Information