漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Prisma Cloud Compute: User role authorization secret for Console leaked through log file export
Vulnerability Description
An information exposure through log file vulnerability exists in the Palo Alto Networks Prisma Cloud Compute Console where a secret used to authorize the role of the authenticated user is logged to a debug log file. Authenticated Operator role and Auditor role users with access to the debug log files can use this secret to gain Administrator role access for their active session in Prisma Cloud Compute. Prisma Cloud Compute SaaS versions were automatically upgraded to the fixed release. This issue impacts all Prisma Cloud Compute versions earlier than Prisma Cloud Compute 21.04.412.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
Vulnerability Type
通过日志文件的信息暴露
Vulnerability Title
Palo Alto Networks Prisma Cloud 日志信息泄露漏洞
Vulnerability Description
Palo Alto Networks Prisma Cloud是美国Palo Alto Networks公司的一款综合云原生安全平台。提供云安全服务。 Palo Alto Networks Prisma Cloud Compute 存在日志信息泄露漏洞,该漏洞源于一个用于授权身份验证用户角色的秘密被记录到调试日志文件中,远程用户可以读取日志文件并访问敏感数据。攻击者可利用该漏洞允许远程用户访问敏感信息。
CVSS Information
N/A
Vulnerability Type
N/A