Vulnerability Description
SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Prior to version 1.27.0-rc1, when the provided datastore URI is malformed (e.g. by having a password which contains `:`) the full URI (including the provided password) is printed, so that the password is shown in the logs. Version 1.27.0-rc1 patches this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Authzed | Spicedb | < 1.27.0 |
Related Weaknesses (CWE)
References
- https://github.com/authzed/spicedb/commit/ae50421b80f895e4c98d999b18e06b6f1e6f1cPatch
- https://github.com/authzed/spicedb/security/advisories/GHSA-jg7w-cxjv-98c2Vendor Advisory
- https://github.com/authzed/spicedb/commit/ae50421b80f895e4c98d999b18e06b6f1e6f1cPatch
- https://github.com/authzed/spicedb/security/advisories/GHSA-jg7w-cxjv-98c2Vendor Advisory
FAQ
What is CVE-2023-46255?
CVE-2023-46255 is a vulnerability with a CVSS score of 4.2 (MEDIUM). SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Prior to version 1.27.0-rc1, when the provided datastore URI is malfor...
How severe is CVE-2023-46255?
CVE-2023-46255 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46255?
Check the references section above for vendor advisories and patch information. Affected products include: Authzed Spicedb.