CVE-2023-0436

MEDIUM

Mongodb Atlas Kubernetes Operator < 1.7.1 - Log Information Exposure

Title source: rule
STIX 2.1

Description

The affected versions of MongoDB Atlas Kubernetes Operator may print sensitive information like GCP service account keys and API integration secrets while DEBUG mode logging is enabled. This issue affects MongoDB Atlas Kubernetes Operator versions: 1.5.0, 1.6.0, 1.6.1, 1.7.0. Please note that this is reported on an EOL version of the product, and users are advised to upgrade to the latest supported version. Required Configuration:  DEBUG logging is not enabled by default, and must be configured by the end-user. To check the log-level of the Operator, review the flags passed in your deployment configuration (eg. https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 )

References (1)

Core 1
Core References

Scores

CVSS v3 4.5
EPSS 0.0027
EPSS Percentile 50.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

Details

CWE
CWE-532
Status published
Products (2)
mongodb/atlas_kubernetes_operator 1.5.0
mongodb/atlas_kubernetes_operator 1.6.0 - 1.7.1
Published Nov 07, 2023
Tracked Since Feb 18, 2026