{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-3429","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2021-03-10T23:54:34.444Z","datePublished":"2023-04-19T21:42:02.402Z","dateUpdated":"2025-02-05T14:44:18.828Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://github.com/canonical/cloud-init/releases","packageName":"cloud-init","platforms":["Linux"],"product":"cloud-init","repo":"https://github.com/canonical/cloud-init/","vendor":"Canonical Ltd.","versions":[{"lessThan":"21.2","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Carl Pearson"}],"datePublic":"2021-03-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user."}],"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.5,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532","lang":"en","type":"CWE"}]}],"references":[{"tags":["patch"],"url":"https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668"}],"title":"sensitive data exposure in cloud-init logs","providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2023-04-19T21:42:02.402Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T16:53:17.576Z"},"title":"CVE Program Container","references":[{"tags":["patch","x_transferred"],"url":"https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-532","lang":"en","description":"CWE-532 Insertion of Sensitive Information into Log File"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-05T14:43:36.200298Z","id":"CVE-2021-3429","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-05T14:44:18.828Z"}}]}}