Miggo Logo

CVE-2022-31066: Configuration API in EdgeXFoundry 2.1.0 and earlier exposes message bus credentials to local unauthenticated users

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.38264%
Published
6/17/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/edgexfoundry/device-sdk-go/v2go< 2.1.12.1.1
github.com/edgexfoundry/app-functions-sdk-go/v2go< 2.1.12.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key points: 1) The configuration endpoint handler (GetConfig) returning sensitive MessageBus credentials stored in the configuration struct, and 2) The message bus initialization logic failing to remove credentials from the configuration after client creation. The patches in edgexfoundry/edgex-go#4016 and edgexfoundry/device-sdk-go#1161 explicitly modify these areas to delete credential fields, confirming their role in the exposure. The HTTP handler's direct exposure of configuration data and the initialization logic's retention of sensitive values make these functions clearly vulnerable.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** /*pi/v*/*on*i* *n*point *xpos*s m*ss*** *us *r***nti*ls to lo**l un*ut**nti**t** us*rs. In s**urity-*n**l** mo**, m*ss*** *us *r***nti*ls *r* suppos** to ** k*pt in t** ****X s**r*t stor* *n* r*quir* *ut**nti**tion to ****ss. T*is vu

Reasoning

T** vuln*r**ility st*ms *rom two k*y points: *) T** *on*i*ur*tion *n*point **n*l*r (**t*on*i*) r*turnin* s*nsitiv* M*ss****us *r***nti*ls stor** in t** *on*i*ur*tion stru*t, *n* *) T** m*ss*** *us initi*liz*tion lo*i* **ilin* to r*mov* *r***nti*ls *r
CVE-2022-31066: EdgeXFoundry Config API Creds | Miggo