PT-2023-2479 · Spicedb · Spicedb
Amit-Laish
·
Published
2023-04-03
·
Updated
2024-08-20
·
CVE-2023-29193
8.7
High
Base vector | Vector | AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions:
SpiceDB versions prior to 1.19.1
Description:
The issue is related to the SpiceDB database system, specifically with the `/debug/pprof/cmdline` endpoint served by the metrics service, which reveals command-line flags provided for debugging purposes. If a password is set via the `--grpc-preshared-key` flag, the key is revealed by this endpoint along with any other flags provided to the SpiceDB binary. This can allow an attacker to gain unauthorized access to sensitive information. Users configuring SpiceDB via environment variables or following recommended best practices for production usage are not affected. However, users who expose their metrics port to an untrusted network and configure `--grpc-preshared-key` via command-line flag may be affected.
Recommendations:
To resolve the issue, consider the following:
- Configure the preshared key via an environment variable (e.g., `SPICEDB GRPC PRESHARED KEY=yoursecret spicedb serve`).
- Reconfigure the `--metrics-addr` flag to bind to a trusted network (e.g., `--metrics-addr=localhost:9090`).
- Disable the metrics service via the flag (e.g., `--metrics-enabled=false`).
- Adopt one of the recommended deployment models: Authzed's managed services or the SpiceDB Operator.
Fix
Generation of Error Message Containing Sensitive Information
Weakness Enumeration
Related Identifiers
Affected Products
References · 13
- https://github.com/authzed/spicedb/releases/tag/v1.19.1⭐ 5168 🔗 281 · Vendor Advisory
- https://github.com/authzed/spicedb/commit/9bbd7d76b6eaba33fe0236014f9b175d21232999⭐ 5168 🔗 281 · Patch
- https://github.com/authzed/spicedb/security/advisories/GHSA-cjr9-mr35-7xh6⭐ 5168 🔗 281 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2023-29193 · Vendor Advisory
- https://bdu.fstec.ru/vul/2023-02270 · Security Note
- https://osv.dev/vulnerability/GHSA-cjr9-mr35-7xh6 · Vendor Advisory
- https://osv.dev/vulnerability/GO-2023-1723 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-29193 · Security Note
- https://github.com/authzed/spicedb⭐ 5741 🔗 318 · Note
- https://github.com/authzed/spicedb-operator⭐ 70 🔗 29 · Note
- https://t.me/cvenotify/48269 · Telegram Post
- https://t.me/cibsecurity/62198 · Telegram Post
- https://vuldb.com/ru/?id.225928 · Note