Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0177 | Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.\n\n |
Github GHSA |
GHSA-r2hw-74xv-4gqp | Nautobot vulnerable to exposure of hashed user passwords via REST API |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-11T17:02:05.910Z
Reserved: 2023-10-16T17:51:35.572Z
Link: CVE-2023-46128
Updated: 2024-08-02T20:37:39.490Z
Status : Modified
Published: 2023-10-25T18:17:36.607
Modified: 2024-11-21T08:27:56.323
Link: CVE-2023-46128
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA