Search criteria
2 vulnerabilities found for eventstoredb by kurrent
CVE-2024-26133 (GCVE-0-2024-26133)
Vulnerability from nvd – Published: 2024-02-21 16:49 – Updated: 2024-08-01 23:59
VLAI?
Title
EventStoreDB Projections Subsystem has potential password leak
Summary
EventStoreDB (ESDB) is an operational database built to store events. A vulnerability has been identified in the projections subsystem in versions 20 prior to 20.10.6, 21 prior to 21.10.11, 22 prior to 22.10.5, and 23 prior to 23.10.1. Only database instances that use custom projections are affected by this vulnerability. User passwords may become accessible to those who have access to the chunk files on disk, and users who have read access to system streams. Only users in the `$admins` group can access system streams by default. ESDB 23.10.1, 22.10.5, 21.10.11, and 20.10.6 contain a patch for this issue. Users should upgrade EventStoreDB, reset the passwords for current and previous members of `$admins` and `$ops` groups, and, if a password was reused in any other system, reset it in those systems to a unique password to follow best practices. If an upgrade cannot be done immediately, reset the passwords for current and previous members of `$admins` and `$ops` groups. Avoid creating custom projections until the patch has been applied.
Severity ?
5.5 (Medium)
CWE
- CWE-256 - Plaintext Storage of a Password
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| EventStore | EventStore |
Affected:
>= 23.0.0, < 23.10.1
Affected: >= 22.0.0, < 22.10.5 Affected: >= 21.0.0, < 21.10.11 Affected: >= 20.0.0, < 20.10.6 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-26133",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T20:39:57.383915Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:53.650Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:59:32.615Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684"
},
{
"name": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf"
},
{
"name": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version"
},
{
"name": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10"
},
{
"name": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133"
},
{
"name": "https://www.eventstore.com/blog/new-version-strategy",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.eventstore.com/blog/new-version-strategy"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "EventStore",
"vendor": "EventStore",
"versions": [
{
"status": "affected",
"version": "\u003e= 23.0.0, \u003c 23.10.1"
},
{
"status": "affected",
"version": "\u003e= 22.0.0, \u003c 22.10.5"
},
{
"status": "affected",
"version": "\u003e= 21.0.0, \u003c 21.10.11"
},
{
"status": "affected",
"version": "\u003e= 20.0.0, \u003c 20.10.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "EventStoreDB (ESDB) is an operational database built to store events. A vulnerability has been identified in the projections subsystem in versions 20 prior to 20.10.6, 21 prior to 21.10.11, 22 prior to 22.10.5, and 23 prior to 23.10.1. Only database instances that use custom projections are affected by this vulnerability. User passwords may become accessible to those who have access to the chunk files on disk, and users who have read access to system streams. Only users in the `$admins` group can access system streams by default. ESDB 23.10.1, 22.10.5, 21.10.11, and 20.10.6 contain a patch for this issue. Users should upgrade EventStoreDB, reset the passwords for current and previous members of `$admins` and `$ops` groups, and, if a password was reused in any other system, reset it in those systems to a unique password to follow best practices. If an upgrade cannot be done immediately, reset the passwords for current and previous members of `$admins` and `$ops` groups. Avoid creating custom projections until the patch has been applied."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-256",
"description": "CWE-256: Plaintext Storage of a Password",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-21T16:49:32.426Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684"
},
{
"name": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf"
},
{
"name": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version",
"tags": [
"x_refsource_MISC"
],
"url": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version"
},
{
"name": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10",
"tags": [
"x_refsource_MISC"
],
"url": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10"
},
{
"name": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133"
},
{
"name": "https://www.eventstore.com/blog/new-version-strategy",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.eventstore.com/blog/new-version-strategy"
}
],
"source": {
"advisory": "GHSA-6r53-v8hj-x684",
"discovery": "UNKNOWN"
},
"title": "EventStoreDB Projections Subsystem has potential password leak"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-26133",
"datePublished": "2024-02-21T16:49:32.426Z",
"dateReserved": "2024-02-14T17:40:03.687Z",
"dateUpdated": "2024-08-01T23:59:32.615Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-26133 (GCVE-0-2024-26133)
Vulnerability from cvelistv5 – Published: 2024-02-21 16:49 – Updated: 2024-08-01 23:59
VLAI?
Title
EventStoreDB Projections Subsystem has potential password leak
Summary
EventStoreDB (ESDB) is an operational database built to store events. A vulnerability has been identified in the projections subsystem in versions 20 prior to 20.10.6, 21 prior to 21.10.11, 22 prior to 22.10.5, and 23 prior to 23.10.1. Only database instances that use custom projections are affected by this vulnerability. User passwords may become accessible to those who have access to the chunk files on disk, and users who have read access to system streams. Only users in the `$admins` group can access system streams by default. ESDB 23.10.1, 22.10.5, 21.10.11, and 20.10.6 contain a patch for this issue. Users should upgrade EventStoreDB, reset the passwords for current and previous members of `$admins` and `$ops` groups, and, if a password was reused in any other system, reset it in those systems to a unique password to follow best practices. If an upgrade cannot be done immediately, reset the passwords for current and previous members of `$admins` and `$ops` groups. Avoid creating custom projections until the patch has been applied.
Severity ?
5.5 (Medium)
CWE
- CWE-256 - Plaintext Storage of a Password
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| EventStore | EventStore |
Affected:
>= 23.0.0, < 23.10.1
Affected: >= 22.0.0, < 22.10.5 Affected: >= 21.0.0, < 21.10.11 Affected: >= 20.0.0, < 20.10.6 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-26133",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T20:39:57.383915Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:53.650Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:59:32.615Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684"
},
{
"name": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf"
},
{
"name": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version"
},
{
"name": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10"
},
{
"name": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133"
},
{
"name": "https://www.eventstore.com/blog/new-version-strategy",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.eventstore.com/blog/new-version-strategy"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "EventStore",
"vendor": "EventStore",
"versions": [
{
"status": "affected",
"version": "\u003e= 23.0.0, \u003c 23.10.1"
},
{
"status": "affected",
"version": "\u003e= 22.0.0, \u003c 22.10.5"
},
{
"status": "affected",
"version": "\u003e= 21.0.0, \u003c 21.10.11"
},
{
"status": "affected",
"version": "\u003e= 20.0.0, \u003c 20.10.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "EventStoreDB (ESDB) is an operational database built to store events. A vulnerability has been identified in the projections subsystem in versions 20 prior to 20.10.6, 21 prior to 21.10.11, 22 prior to 22.10.5, and 23 prior to 23.10.1. Only database instances that use custom projections are affected by this vulnerability. User passwords may become accessible to those who have access to the chunk files on disk, and users who have read access to system streams. Only users in the `$admins` group can access system streams by default. ESDB 23.10.1, 22.10.5, 21.10.11, and 20.10.6 contain a patch for this issue. Users should upgrade EventStoreDB, reset the passwords for current and previous members of `$admins` and `$ops` groups, and, if a password was reused in any other system, reset it in those systems to a unique password to follow best practices. If an upgrade cannot be done immediately, reset the passwords for current and previous members of `$admins` and `$ops` groups. Avoid creating custom projections until the patch has been applied."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-256",
"description": "CWE-256: Plaintext Storage of a Password",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-21T16:49:32.426Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/EventStore/EventStore/security/advisories/GHSA-6r53-v8hj-x684"
},
{
"name": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/EventStore/EventStore/commit/6d4edee18c7fe886abffe58fa1f97d72681b24bf"
},
{
"name": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version",
"tags": [
"x_refsource_MISC"
],
"url": "https://developers.eventstore.com/cloud/ops/#upgrading-eventstoredb-version"
},
{
"name": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10",
"tags": [
"x_refsource_MISC"
],
"url": "https://developers.eventstore.com/server/v22.10/upgrade-guide.html#upgrade-guide-for-eventstoredb-22-10"
},
{
"name": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.eventstore.com/blog/eventstoredb-security-release-23.10-22.10-21.10-and-20.10-for-cve-2024-26133"
},
{
"name": "https://www.eventstore.com/blog/new-version-strategy",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.eventstore.com/blog/new-version-strategy"
}
],
"source": {
"advisory": "GHSA-6r53-v8hj-x684",
"discovery": "UNKNOWN"
},
"title": "EventStoreDB Projections Subsystem has potential password leak"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-26133",
"datePublished": "2024-02-21T16:49:32.426Z",
"dateReserved": "2024-02-14T17:40:03.687Z",
"dateUpdated": "2024-08-01T23:59:32.615Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}