{"id":"CVE-2022-39351","summary":"Dependency-Track vulnerable to logging of API keys in clear text when handling API requests using keys with insufficient permissions","details":"Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.6.0, performing an API request using a valid API key with insufficient permissions causes the API key to be written to Dependency-Track's audit log in clear text. Actors with access to the audit log can exploit this flaw to gain access to valid API keys. The issue has been fixed in Dependency-Track 4.6.0. Instead of logging the entire API key, only the last 4 characters of the key will be logged. It is strongly recommended to check historic logs for occurrences of this behavior, and re-generating API keys in case of leakage.","aliases":["GHSA-gh7v-4hxp-gqp4"],"modified":"2026-04-14T04:27:24.815155Z","published":"2022-10-25T00:00:00Z","database_specific":{"unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"fixed":"4.6.0"}]}],"cwe_ids":["CWE-312"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39351.json"},"references":[{"type":"WEB","url":"https://docs.dependencytrack.org/changelog/"},{"type":"WEB","url":"https://github.com/DependencyTrack/dependency-track/blob/4.5.0/src/main/docker/logback.xml"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39351.json"},{"type":"ADVISORY","url":"https://github.com/DependencyTrack/dependency-track/security/advisories/GHSA-gh7v-4hxp-gqp4"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39351"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dependencytrack/dependency-track","events":[{"introduced":"0"},{"fixed":"18e9a134462100cb37c12d602fc913362bd79a6e"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"4.6.0"}],"cpe":"cpe:2.3:a:owasp:dependency-track:*:*:*:*:*:*:*:*"}}],"versions":["3.0.0","3.0.1","3.0.3","3.0.4","3.1.0","3.1.1","3.2.0","3.2.1","3.2.2","3.3.0","3.3.1","3.4.0","3.4.1","3.5.0","3.5.1","3.6.0","3.6.1","3.7.0","3.7.1","3.8.0","4.0.0","4.0.0-SNAPSHOT","4.0.0-beta.1","4.0.0-beta.3","4.0.0-beta.4","4.0.0-rc.1","4.0.1","4.1.0","4.2.0","4.2.1","4.2.2","4.3.0","4.3.1","4.3.2","4.3.3","4.3.4","4.3.5","4.3.6","4.4.0","4.4.1","4.4.2","4.5.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-39351.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}]}