Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9621: Insertion of Sensitive Information into Log File

0
Medium
VulnerabilityCVE-2024-9621cvecve-2024-9621
Published: Tue Oct 08 2024 (10/08/2024, 16:26:09 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Quarkus CXF. Passwords and other secrets may appear in the application log in spite of the user configuring them to be hidden. This issue requires some special configuration to be vulnerable, such as SOAP logging enabled, application set client, and endpoint logging properties, and the attacker must have access to the application log.

AI-Powered Analysis

AILast updated: 11/20/2025, 21:18:22 UTC

Technical Analysis

CVE-2024-9621 is a vulnerability identified in the Quarkus CXF framework, which is used for building Java applications that utilize SOAP web services. The issue arises when sensitive information such as passwords and secrets are inadvertently inserted into application log files despite user configurations intended to mask or hide these details. This occurs under specific conditions: SOAP logging must be enabled, and particular client and endpoint logging properties must be set. The vulnerability does not stem from a coding flaw that allows direct remote exploitation but rather from a misconfiguration or insufficient filtering of sensitive data before logging. An attacker must have access to the application logs to exploit this vulnerability, which means the threat is primarily an information disclosure risk rather than a direct compromise vector. The CVSS 3.1 score of 5.3 reflects a medium severity, with a network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of secure logging practices and proper configuration management in Java-based SOAP services using Quarkus CXF.

Potential Impact

For European organizations, this vulnerability poses a significant confidentiality risk, especially for those using Quarkus CXF in SOAP-based applications where sensitive credentials or secrets are handled. If logs containing sensitive information are accessible by unauthorized personnel or attackers, it could lead to credential theft, unauthorized access to backend systems, or lateral movement within the network. This risk is amplified in sectors with strict data protection regulations such as finance, healthcare, and government, where leakage of sensitive information can result in regulatory penalties and reputational damage. The vulnerability does not directly affect system integrity or availability but can be a stepping stone for further attacks if secrets are compromised. Organizations with centralized logging systems or insufficient log access controls are particularly vulnerable. Since exploitation requires log access, insider threats or attackers who have already breached perimeter defenses pose the greatest risk. The medium severity rating suggests that while the vulnerability is not immediately critical, it should be addressed promptly to prevent potential data breaches.

Mitigation Recommendations

1. Disable SOAP logging unless absolutely necessary, especially in production environments. 2. Review and adjust client and endpoint logging configurations in Quarkus CXF to ensure sensitive information is never logged. 3. Implement strict access controls on application log files, limiting access to only trusted administrators and systems. 4. Use log management solutions that support redaction or masking of sensitive data before storage. 5. Regularly audit logs for accidental exposure of secrets and remove or rotate any compromised credentials immediately. 6. Apply the latest patches or updates from Quarkus CXF as they become available to address this and related vulnerabilities. 7. Educate developers and operations teams on secure logging practices and the risks of logging sensitive information. 8. Consider implementing runtime detection tools that can alert on anomalous access to logs or unusual logging behavior. 9. If SOAP logging is required for troubleshooting, ensure logs are stored securely and access is tightly controlled and monitored. 10. Integrate secrets management solutions to avoid hardcoding or logging secrets in the first place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-08T01:08:43.306Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f82024f1c50aa2eb5aeb3

Added to database: 11/20/2025, 9:02:58 PM

Last enriched: 11/20/2025, 9:18:22 PM

Last updated: 11/20/2025, 11:06:31 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats