CVE-2023-48700: Clear Text Credentials Exposed via Onboarding Task
5.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3628%
CWE
Published
11/21/2023
Updated
11/22/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| nautobot-device-onboarding | pip | >= 2.0.0, < 3.0.0 | 3.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from credentials being stored in Celery task arguments visible in Job Results. The primary culprits are: 1) The Celery task handler itself (run_onboarding_task), which receives sensitive arguments, and 2) The enqueue method that initiates the task with raw credentials. These functions would directly handle credential arguments without sanitization prior to v3.0.0. The high confidence comes from the advisory's explicit mention of task args exposure and the typical Celery/Nautobot job result storage patterns.