Apache IoTDB JDBC Driver, Information Disclosure, CVE-2025-XXXX (Moderate)

Listen to this Post

The vulnerability (CVE-2025-XXXX) in Apache IoTDB JDBC driver exposes sensitive information through log files due to improper logging practices. When database queries containing credentials or other confidential data are executed, the driver logs these details in plaintext. Attackers with access to log files can extract credentials, session tokens, or other sensitive data, leading to unauthorized access. Affected versions include 0.10.0 to 1.3.3 and 2.0.1-beta to 2.0.2. The issue is fixed in versions 1.3.4 and 2.0.2 by sanitizing logs.

DailyCVE Form:

Platform: Apache IoTDB
Version: 0.10.0-1.3.3
Vulnerability: Information disclosure
Severity: Moderate
Date: May 14, 2025

What Undercode Say:

Analytics:

  • Risk: Medium (log exposure requires filesystem access).
  • Attack Vector: Local/log access.
  • Impact: Credential theft, data leaks.

Exploit Command:

grep -r "password|token" /var/log/iotdb/

Mitigation Steps:

1. Upgrade:

mvn clean install -Diotdb-jdbc.version=2.0.2

2. Log Sanitization: Disable debug logging in `logback.xml`:

<logger name="org.apache.iotdb.jdbc" level="ERROR"/>

3. Audit Logs:

find /var/log/iotdb/ -type f -exec chmod 600 {} \;

Detection Script (Python):

import re
with open("/var/log/iotdb/jdbc.log", "r") as f:
if re.search("password=|token=", f.read()):
print("VULNERABLE")

Patch Diff:

- logger.debug("Query: " + query);
+ logger.debug("Query sanitized");

References:

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top