{"api_version":"1","generated_at":"2026-04-22T22:50:33+00:00","cve":"CVE-2023-44483","urls":{"html":"https://cve.report/CVE-2023-44483","api":"https://cve.report/api/cve/CVE-2023-44483.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-44483","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-44483"},"summary":{"title":"CVE-2023-44483","description":"All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled. Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-10-20 10:15:00","updated_at":"2023-10-27 18:49:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55","name":"https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/20/5","name":"http://www.openwall.com/lists/oss-security/2023/10/20/5","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-44483: Apache Santuario: Private Key disclosure in debug-log output","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-44483","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44483","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"44483","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"santuario_xml_security_for_java","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-44483","qid":"150788","title":"Oracle WebLogic Server Multiple Vulnerabilities (CPUJAN2024)"},{"cve":"CVE-2023-44483","qid":"242821","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 (RHSA-2024:0712)"},{"cve":"CVE-2023-44483","qid":"242822","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 (RHSA-2024:0710)"},{"cve":"CVE-2023-44483","qid":"242823","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 (RHSA-2024:0711)"},{"cve":"CVE-2023-44483","qid":"379027","title":"IBM WebSphere Application Server Liberty Information Disclosure Vulnerability (7076305)"},{"cve":"CVE-2023-44483","qid":"87550","title":"Oracle WebLogic Server Multiple Vulnerabilities (CPUJAN2024)"},{"cve":"CVE-2023-44483","qid":"995676","title":"Java (Maven) Security Update for org.apache.santuario:xmlsec (GHSA-xfrj-6vvc-3xm2)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-44483","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled. Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-532 Insertion of Sensitive Information into Log File","cweId":"CWE-532"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache Santuario","version":{"version_data":[{"version_affected":"<","version_name":"2.2","version_value":"2.2.6"},{"version_affected":"<","version_name":"2.3","version_value":"2.3.4"},{"version_affected":"<","version_name":"3.0","version_value":"3.0.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55","refsource":"MISC","name":"https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/20/5","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/10/20/5"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Apache Santuario would like to thank Max Fichtelmann for reporting this issue."}]},"nvd":{"publishedDate":"2023-10-20 10:15:00","lastModifiedDate":"2023-10-27 18:49:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*","versionStartIncluding":"2.3.0","versionEndExcluding":"2.3.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*","versionEndExcluding":"2.2.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}