Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11217: Debug Messages Revealing Unnecessary Information

0
Medium
VulnerabilityCVE-2024-11217cvecve-2024-11217
Published: Fri Nov 15 2024 (11/15/2024, 20:48:46 UTC)
Source: CVE

Description

A vulnerability was found in the OAuth-server. OAuth-server logs the OAuth2 client secret when the logLevel is Debug higher for OIDC/GitHub/GitLab/Google IDPs login options.

AI-Powered Analysis

AILast updated: 11/21/2025, 06:59:10 UTC

Technical Analysis

CVE-2024-11217 is a vulnerability identified in OAuth-server versions 4.12.* through 4.18.* where the OAuth2 client secret is logged in plaintext when the logging level is set to Debug or higher during authentication flows involving OIDC, GitHub, GitLab, or Google identity providers. This occurs because the server's debug logs capture sensitive credential information unnecessarily, violating the principle of least privilege in logging. The vulnerability does not require user interaction but does require an attacker to have high privileges (PR:H) to access the logs, which are typically restricted to administrators or system operators. The CVSS 3.1 score of 4.9 reflects a medium severity, primarily due to the confidentiality impact (client secrets exposure) without direct impact on integrity or availability. Exploitation could allow an attacker with access to logs to obtain client secrets, potentially enabling unauthorized OAuth2 client impersonation or token issuance. No known exploits are currently reported in the wild. The vulnerability affects multiple minor versions of OAuth-server, indicating a persistent issue across several releases. The root cause is insufficient sanitization or filtering of sensitive data in debug logs, a common security misconfiguration. Organizations relying on OAuth-server for federated authentication with major IDPs should assess their logging configurations and access controls to prevent leakage of sensitive credentials.

Potential Impact

The primary impact of CVE-2024-11217 is the exposure of OAuth2 client secrets through debug-level logs, which can lead to unauthorized access to OAuth2 clients if logs are accessed by malicious insiders or attackers who have gained elevated privileges. For European organizations, this can result in compromised authentication flows, unauthorized access to protected resources, and potential downstream data breaches. Given the widespread use of OAuth-server in identity and access management, especially in cloud and enterprise environments, the confidentiality breach could undermine trust in authentication systems. Organizations subject to GDPR and other data protection regulations face increased compliance risks if sensitive credentials are leaked. The vulnerability does not directly affect system availability or integrity but can facilitate further attacks if client secrets are misused. The requirement for high privileges to access logs limits exploitation to insiders or attackers with escalated access, but this does not eliminate risk, especially in complex environments with multiple administrators. The lack of known exploits in the wild reduces immediate risk but does not preclude targeted attacks. European sectors with critical infrastructure, finance, healthcare, and government services using OAuth-server are particularly sensitive to such credential exposures.

Mitigation Recommendations

To mitigate CVE-2024-11217, organizations should immediately review and adjust their OAuth-server logging configurations to avoid using Debug or higher log levels in production environments, especially where logs may be accessible to multiple users. Implement strict access controls and monitoring on log storage to prevent unauthorized access. Sanitize or mask sensitive information in logs by applying log filtering or redaction mechanisms if debug logging is necessary for troubleshooting. Monitor for any unusual access patterns to logs or OAuth2 client secrets. Apply vendor patches or updates as soon as they become available to address this vulnerability at the source. Conduct regular audits of logging practices and secrets management policies to ensure no sensitive data is logged inadvertently. Consider using centralized, secure logging solutions with encryption and role-based access control to limit exposure. Educate administrators and developers about the risks of verbose logging and the importance of protecting OAuth2 credentials. Finally, rotate OAuth2 client secrets if exposure is suspected or confirmed to prevent misuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-11-14T12:57:54.752Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8418

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 11/21/2025, 6:59:10 AM

Last updated: 12/4/2025, 10:15:47 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats