CVE-2023-48700 – nautobot-device-onboarding
Package
Manager: pip
Name: nautobot-device-onboarding
Vulnerable Version: >=2.0.0 <3.0.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00149 pctl0.35968
Details
Clear Text Credentials Exposed via Onboarding Task ### Impact When credentials are provided while creating an OnboardingTask they may be visible via the Job Results view under the Additional Data tab as args for the Celery Task execution. This only applies to OnboardingTasks that are created with credentials specified while on v2.0.0-2.0.2 of Nautobot Device Onboarding. This advisory does not apply earlier version or when using NAPALM_USERNAME & NAPALM_PASSWORD from nautobot_config.py ### Patches v3.0.0 ### Workarounds None ### Recommendations * Delete all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X * Upgrade to v3.0.0 * Rotate any exposed credential
Metadata
Created: 2023-11-21T23:50:02Z
Modified: 2024-11-22T18:13:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-qf3c-rw9f-jh7v/GHSA-qf3c-rw9f-jh7v.json
CWE IDs: ["CWE-200", "CWE-256"]
Alternative ID: GHSA-qf3c-rw9f-jh7v
Finding: F310
Auto approve: 1