CVE-2023-27573
Description
netbox-docker before 2.5.0 has a superuser account with default credentials (admin password for the admin account, and 0123456789abcdef0123456789abcdef01234567 value for SUPERUSER_API_TOKEN). In practice on the public Internet, almost all users changed the password but only about 90% changed the token. Having a default token value was intentional and was valuable for the main intended use case of the netbox-docker product (isolated development networks). Some users engaged in an effort to repurpose netbox-docker for production. The documentation for this effort stated that the defaults must not be used. However, installation did not ensure non-default values. The Supplier was aware of the CVE ID assignment and did not object to the assignment.
Affected products
2- netbox-community/netbox-dockerv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/netbox-community/netbox-docker/pull/959nvdIssue TrackingPatch
- github.com/netbox-community/netbox-docker/issues/953nvdExploitIssue Tracking
- github.com/netbox-community/netbox-docker/releases/tag/2.5.0nvdRelease Notes
News mentions
0No linked articles in our index yet.