Insertion of Sensitive Information into Log File Affecting aws-sigv4 package, versions >=0.2.0 <0.2.1>=0.3.0 <0.3.1>=0.4.1 <0.4.2>=0.5.2 <0.5.3>=0.6.0 <0.6.1>=0.7.0 <0.7.1>=0.8.0 <0.8.1>=0.9.0 <0.9.1>=0.10.1 <0.10.2>=0.11.0 <0.11.1>=0.12.0 <0.12.1>=0.13.0 <0.13.1>=0.14.0 <0.14.1>=0.15.0 <0.15.1>=0.46.0 <0.46.1>=0.47.0 <0.47.1>=0.48.0 <0.48.1>=0.49.0 <0.49.1>=0.50.0 <0.50.1>=0.51.0 <0.51.1>=0.52.0 <0.52.1>=0.53.1 <0.53.2>=0.54.1 <0.54.2>=0.55.0 <0.55.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-AWSSIGV4-5457944
  • published24 Apr 2023
  • disclosed24 Apr 2023
  • creditUnknown

Introduced: 24 Apr 2023

CVE-2023-30610  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade aws-sigv4 to version 0.2.1, 0.3.1, 0.4.2, 0.5.3, 0.6.1, 0.7.1, 0.8.1, 0.9.1, 0.10.2, 0.11.1, 0.12.1, 0.13.1, 0.14.1, 0.15.1, 0.46.1, 0.47.1, 0.48.1, 0.49.1, 0.50.1, 0.51.1, 0.52.1, 0.53.2, 0.54.2, 0.55.1 or higher.

Overview

aws-sigv4 is a SigV4 signer for HTTP requests and Event Stream messages

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File. When debug-formatted, the aws_sigv4::SigningParams struct includes a user's AWS access key, AWS secret key, and security token in plaintext. When TRACE-level logging is enabled for an SDK (e.g. with RUST_LOG=trace), SigningParams is printed, thereby revealing those credentials to anyone with access to logs.

References

CVSS Scores

version 3.1