CVE-2023-4509

It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

02 Jul 2025, 18:09

Type Values Removed Values Added
References () https://advisories.octopus.com/post/2024/sa2024-02/ - () https://advisories.octopus.com/post/2024/sa2024-02/ - Vendor Advisory
First Time Octopus octopus Server
Linux linux Kernel
Linux
Microsoft windows
Octopus
Microsoft
CPE cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

21 Nov 2024, 08:35

Type Values Removed Values Added
References () https://advisories.octopus.com/post/2024/sa2024-02/ - () https://advisories.octopus.com/post/2024/sa2024-02/ -

07 Nov 2024, 17:35

Type Values Removed Values Added
CWE CWE-319

18 Apr 2024, 13:04

Type Values Removed Values Added
Summary
  • (es) Es posible que una clave API se registre en texto plano en el archivo de registro de auditoría después de un intento de inicio de sesión no válido.

18 Apr 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-18 00:15

Updated : 2025-07-02 18:09


NVD link : CVE-2023-4509

Mitre link : CVE-2023-4509

CVE.ORG link : CVE-2023-4509


JSON object : View

Products Affected

linux

  • linux_kernel

microsoft

  • windows

octopus

  • octopus_server
CWE
CWE-319

Cleartext Transmission of Sensitive Information