{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5182","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2023-09-25T18:11:51.008Z","datePublished":"2023-10-06T23:28:48.953Z","dateUpdated":"2024-09-19T16:41:29.487Z"},"containers":{"cna":{"affected":[{"packageName":"subiquity","product":"subiquity","vendor":"Canonical Ltd.","repo":"https://github.com/canonical/subiquity","platforms":["Linux"],"versions":[{"status":"affected","version":"0","lessThanOrEqual":"23.09.1","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"Sensitive data could be exposed in logs of subiquity version 23.09.1 and earlier. An attacker in the adm group could use this information to find hashed passwords and possibly escalate their privilege."}],"datePublic":"2023-10-04T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532","lang":"en","type":"CWE"}]}],"references":[{"tags":["issue-tracking"],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5182"},{"tags":["issue-tracking"],"url":"https://github.com/canonical/subiquity/pull/1820/commits/62e126896fb063808767d74d00886001e38eaa1c"}],"credits":[{"lang":"en","type":"finder","value":"Patric Åhlin"},{"lang":"en","type":"finder","value":"Johan Hortling"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM"}}],"providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2023-10-06T23:28:48.953Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:52:07.925Z"},"title":"CVE Program Container","references":[{"tags":["issue-tracking","x_transferred"],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5182"},{"tags":["issue-tracking","x_transferred"],"url":"https://github.com/canonical/subiquity/pull/1820/commits/62e126896fb063808767d74d00886001e38eaa1c"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-19T16:41:20.619067Z","id":"CVE-2023-5182","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-19T16:41:29.487Z"}}]}}