{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T00:16:48.119","vulnerabilities":[{"cve":{"id":"CVE-2023-46742","sourceIdentifier":"security-advisories@github.com","published":"2024-01-03T17:15:11.010","lastModified":"2024-11-21T08:29:12.450","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS."},{"lang":"es","value":"CubeFS es un sistema de almacenamiento de archivos nativo de la nube de código abierto. Se descubrió que CubeFS anterior a la versión 3.3.1 filtraba claves secretas de usuarios y claves de acceso en los registros de múltiples componentes. Cuando CubeCS crea nuevos usuarios, filtra la clave secreta de los usuarios. Esto podría permitir que un usuario con menos privilegios y acceso a los registros recupere información confidencial y se haga pasar por otros usuarios con mayores privilegios que él. El problema se solucionó en la versión 3.3.1. No hay otra mitigación que actualizar CubeFS."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.3,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:cubefs:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.1","matchCriteriaId":"6E8D59D8-6863-4398-9D77-2442BAF81108"}]}]}],"references":[{"url":"https://github.com/cubefs/cubefs/commit/8dccce6ac8dff3db44d7e9074094c7303a5ff5dd","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/cubefs/cubefs/security/advisories/GHSA-vwch-g97w-hfg2","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/cubefs/cubefs/commit/8dccce6ac8dff3db44d7e9074094c7303a5ff5dd","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/cubefs/cubefs/security/advisories/GHSA-vwch-g97w-hfg2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}