Authored by Ihsan Cetin, Hamza Kaya Toprak

Debezium UI version 2.5 suffers from a credential disclosure vulnerability.

advisories | CVE-2024-28736

# Exploit Title: Debezium UI - Credential Leakage

# Google Dork: N/A

# Date: [2024-03-11]

# Exploit Author: Ihsan Cetin, Hamza Kaya Toprak

# Vendor Homepage: https://debezium.io/

# Software Link: N/A

# Version: < 2.5 (REQUIRED)

# Tested on: [N/A]

# CVE : CVE-2024-28736

Proof of concept:

# Details

#Debezium-ui (version 2.5) is vulnerable to a password exposure issue that could allow an attacker to retrieve sensitive credentials in plaintext format.

# PoC :

#Unmasked Password in Connector Configuration: When navigating to the connectors section within the application's connector screen, the password field, which should ideally be masked for security purposes, is briefly displayed in plaintext format during the initial seconds.

# Plaintext Password Retrieval via API Endpoint: By accessing the URL

http://10.0.15.51:8080//api/connectors/1/account-activity/config

#and searching for the database.password parameter, an attacker can retrieve the database password in plaintext format without any authentication.