{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-46128","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-10-16T17:51:35.572Z","datePublished":"2023-10-24T14:17:52.830Z","dateUpdated":"2024-09-11T17:02:05.910Z"},"containers":{"cna":{"title":"Exposure of hashed user passwords via REST API in Nautobot","problemTypes":[{"descriptions":[{"cweId":"CWE-200","lang":"en","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp","tags":["x_refsource_CONFIRM"],"url":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp"},{"name":"https://github.com/nautobot/nautobot/pull/4692","tags":["x_refsource_MISC"],"url":"https://github.com/nautobot/nautobot/pull/4692"},{"name":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71","tags":["x_refsource_MISC"],"url":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71"}],"affected":[{"vendor":"nautobot","product":"nautobot","versions":[{"version":">= 2.0.0, < 2.0.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-10-24T14:17:52.830Z"},"descriptions":[{"lang":"en","value":"Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.\n\n"}],"source":{"advisory":"GHSA-r2hw-74xv-4gqp","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:37:39.490Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp"},{"name":"https://github.com/nautobot/nautobot/pull/4692","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nautobot/nautobot/pull/4692"},{"name":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-11T17:01:56.458681Z","id":"CVE-2023-46128","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:02:05.910Z"}}]}}