Skip to main content

CVE-2022-32217: Cleartext Storage of Sensitive Information (CWE-312) in Rocket.chat

Medium
VulnerabilityCVE-2022-32217cvecve-2022-32217cwe-312
Published: Fri Sep 23 2022 (09/23/2022, 18:28:14 UTC)
Source: CVE
Vendor/Project: n/a
Product: Rocket.chat

Description

A cleartext storage of sensitive information exists in Rocket.Chat <v4.6.4 due to Oauth token being leaked in plaintext in Rocket.chat logs.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:09:49 UTC

Technical Analysis

CVE-2022-32217 is a medium-severity vulnerability affecting Rocket.Chat versions prior to 4.6.4. The issue involves the cleartext storage of sensitive information, specifically OAuth tokens, within Rocket.Chat logs. OAuth tokens are critical credentials used to authorize and authenticate users or services without exposing passwords. When these tokens are logged in plaintext, an attacker with access to the logs can potentially steal these tokens and impersonate users or services, leading to unauthorized access. The vulnerability is classified under CWE-312, which pertains to the cleartext storage of sensitive data. The CVSS 3.1 base score is 5.3, reflecting a network attack vector with low attack complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality loss, with no direct impact on integrity or availability. The vulnerability was publicly disclosed on September 23, 2022, and fixed in Rocket.Chat version 4.6.4 and later. There are no known exploits in the wild reported to date. The root cause is inadequate handling of sensitive OAuth tokens in application logs, which should be sanitized or encrypted to prevent leakage. This vulnerability highlights the importance of secure logging practices, especially for sensitive authentication credentials in collaboration platforms like Rocket.Chat.

Potential Impact

For European organizations using Rocket.Chat versions prior to 4.6.4, this vulnerability poses a risk of unauthorized access through token theft if an attacker can access application logs. Given Rocket.Chat's use as an open-source team communication platform, often deployed internally or on-premises, the exposure depends on the security of log storage and access controls. Confidentiality breaches could lead to unauthorized data access, impersonation of users or services, and potential lateral movement within networks. While the vulnerability does not directly affect data integrity or availability, the compromise of OAuth tokens can facilitate further attacks, including data exfiltration or privilege escalation. Organizations in sectors with strict data protection regulations, such as GDPR in Europe, could face compliance risks and reputational damage if sensitive information is leaked. The risk is heightened in environments where logs are insufficiently protected or accessible by multiple users or third parties. However, since exploitation requires access to logs, the threat is somewhat mitigated by proper operational security practices. Nonetheless, the vulnerability underscores the need for secure handling of authentication tokens in collaboration tools widely used across European enterprises.

Mitigation Recommendations

European organizations should immediately verify their Rocket.Chat version and upgrade to 4.6.4 or later to apply the official fix. Beyond patching, organizations must audit their logging configurations to ensure sensitive information such as OAuth tokens is never logged in plaintext. Implement log sanitization or redaction mechanisms to automatically mask or exclude sensitive tokens from logs. Access to logs should be strictly controlled using role-based access controls and encrypted storage to prevent unauthorized retrieval. Regularly review and rotate OAuth tokens and credentials to limit exposure duration in case of leakage. Employ monitoring and alerting on unusual access patterns to logs or token usage to detect potential compromise early. For organizations deploying Rocket.Chat in cloud or hybrid environments, ensure that logging and storage comply with best practices for data protection and encryption at rest. Finally, incorporate secure coding and logging guidelines into development and operational processes to prevent similar issues in future releases or custom integrations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2022-06-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6b520acd01a249264631

Added to database: 5/22/2025, 6:22:10 PM

Last enriched: 7/8/2025, 8:09:49 AM

Last updated: 7/28/2025, 10:55:07 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats