Headline
GHSA-qf3c-rw9f-jh7v: Clear Text Credentials Exposed via Onboarding Task
Impact
When credentials are provided while creating an OnboardingTask they may be visible via the Job Results view under the Additional Data tab as args for the Celery Task execution. This only applies to OnboardingTasks that are created with credentials specified while on v2.0.0-2.0.2 of Nautobot Device Onboarding. This advisory does not apply earlier version or when using NAPALM_USERNAME & NAPALM_PASSWORD from nautobot_config.py
Patches
v3.0.0
Workarounds
None
Recommendations
- Delete all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X
- Upgrade to v3.0.0
- Rotate any exposed credential
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-48700
Clear Text Credentials Exposed via Onboarding Task
Package
pip nautobot-device-onboarding (pip)
Affected versions
>= 2.0.0, < 3.0.0
Impact
When credentials are provided while creating an OnboardingTask they may be visible via the Job Results view under the Additional Data tab as args for the Celery Task execution. This only applies to OnboardingTasks that are created with credentials specified while on v2.0.0-2.0.2 of Nautobot Device Onboarding. This advisory does not apply earlier version or when using NAPALM_USERNAME & NAPALM_PASSWORD from nautobot_config.py
Patches
v3.0.0
Workarounds
None
Recommendations
- Delete all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X
- Upgrade to v3.0.0
- Rotate any exposed credential
References
- GHSA-qf3c-rw9f-jh7v
Published to the GitHub Advisory Database
Nov 21, 2023
Last updated
Nov 21, 2023
Related news
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials.