Miggo Logo

CVE-2023-37916: KubePi may leak password hash of any user

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.37207%
Published
7/21/2023
Updated
11/8/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/KubeOperator/kubepigo< 1.6.51.6.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in the user search endpoint (/api/v1/users/search) which returns password hashes. In Go web applications, API endpoints are typically handled by controller functions. The release notes explicitly mention fixing 'user list returning sensitive information', indicating the user management handlers were improperly exposing password fields. The function name follows standard Go API patterns where SearchUsers would handle search requests, and the file path follows typical project structure for API handlers.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *ttp://ku**.pi/ku**pi/*pi/v*/us*rs/s**r**?p***Num=*&&p***Siz*=** l**k p*sswor* o* *ny us*r (in*lu*in* **min). T*is l***s to p*sswor* *r**k *tt**k ### Po* *ttps://*riv*.*oo*l*.*om/*il*/*/*ks**wJ*vS*RJyT*w**pqVmz-Ls**M**M/pr*vi*w ### Imp

Reasoning

T** vuln*r**ility m*ni**sts in t** us*r s**r** *n*point (/*pi/v*/us*rs/s**r**) w*i** r*turns p*sswor* **s**s. In *o w** *ppli**tions, *PI *n*points *r* typi**lly **n*l** *y *ontroll*r *un*tions. T** r*l**s* not*s *xpli*itly m*ntion *ixin* 'us*r list