Apache IoTDB, Information Disclosure via Logs, CVE-2025-XXXX (Moderate)

Listen to this Post

How the CVE Works

Apache IoTDB versions 0.10.0 to 1.3.3 and 2.0.1-beta to 2.0.2 suffer from an information disclosure vulnerability in the `OpenIdAuthorizer` component. Sensitive data, including authentication tokens and credentials, may be inadvertently logged in plaintext within system logs. Attackers with access to log files can extract this information, potentially leading to unauthorized access or session hijacking. The flaw arises due to improper sanitization of debug logs in the OpenID/OAuth flow.

DailyCVE Form

Platform: Apache IoTDB
Version: 0.10.0 – 1.3.3, 2.0.1-beta – 2.0.2
Vulnerability: Info Disclosure via Logs
Severity: Moderate
Date: May 14, 2025

What Undercode Say:

Exploitation:

  1. Log Extraction: Attackers read logs via exposed endpoints or misconfigured permissions.
    grep -r "token=" /var/log/iotdb/
    

2. Session Hijacking: Stolen tokens allow impersonation.

GET /query?token=STOLEN_TOKEN HTTP/1.1
Host: iotdb.example.com

Mitigation:

1. Upgrade Immediately:

For 1.x
wget https://iotdb.apache.org/download/1.3.4
For 2.x
wget https://iotdb.apache.org/download/2.0.2

2. Log Sanitization: Modify logging configuration (`logback.xml`):

<configuration>
<filter class="org.apache.iotdb.logmask.SensitiveDataFilter"/>
</configuration>

3. Access Control: Restrict log directory permissions:

chmod 750 /var/log/iotdb/

Detection:

1. Check Version:

SHOW VERSION;

2. Audit Logs:

journalctl -u iotdb --no-pager | grep -i "token|auth"

References:

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top