{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-2084","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2022-06-14T20:41:08.563Z","datePublished":"2023-04-19T21:47:41.034Z","dateUpdated":"2025-02-05T14:42:29.207Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://github.com/canonical/cloud-init/releases","packageName":"cloud-init","platforms":["Linux"],"product":"cloud-init","repo":"https://github.com/canonical/cloud-init/","vendor":"Canonical Ltd.","versions":[{"lessThan":"23.0","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Mike Stroyan"}],"datePublic":"2022-06-29T22:00:00.000Z","descriptions":[{"lang":"en","value":"Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords."}],"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.5,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532","lang":"en","type":"CWE"}]}],"references":[{"tags":["patch"],"url":"https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c"},{"url":"https://ubuntu.com/security/notices/USN-5496-1","tags":["vendor-advisory"]}],"title":"sensitive data exposure in cloud-init logs","providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2023-04-19T21:47:41.034Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:24:44.266Z"},"title":"CVE Program Container","references":[{"tags":["patch","x_transferred"],"url":"https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c"},{"url":"https://ubuntu.com/security/notices/USN-5496-1","tags":["vendor-advisory","x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-532","lang":"en","description":"CWE-532 Insertion of Sensitive Information into Log File"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-05T14:41:29.870718Z","id":"CVE-2022-2084","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-05T14:42:29.207Z"}}]}}