{"api_version":"1","generated_at":"2026-04-22T22:49:43+00:00","cve":"CVE-2023-46128","urls":{"html":"https://cve.report/CVE-2023-46128","api":"https://cve.report/api/cve/CVE-2023-46128.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-46128","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-46128"},"summary":{"title":"CVE-2023-46128","description":"Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-10-25 18:17:00","updated_at":"2023-11-01 16:25:00"},"problem_types":["CWE-312"],"metrics":[],"references":[{"url":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71","name":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71","refsource":"MISC","tags":[],"title":"Fix `Meta` inheritance in nested serializer classes (#4692) · nautobot/nautobot@1ce8e5c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp","name":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp","refsource":"MISC","tags":[],"title":"Exposure of hashed user passwords via REST API · Advisory · nautobot/nautobot · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/nautobot/nautobot/pull/4692","name":"https://github.com/nautobot/nautobot/pull/4692","refsource":"MISC","tags":[],"title":"Fix `Meta` inheritance in nested serializer classes by glennmatthews · Pull Request #4692 · nautobot/nautobot · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-46128","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46128","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"46128","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"networktocode","cpe5":"nautobot","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-46128","qid":"995704","title":"Python (Pip) Security Update for nautobot (GHSA-r2hw-74xv-4gqp)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-46128","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"nautobot","product":{"product_data":[{"product_name":"nautobot","version":{"version_data":[{"version_affected":"=","version_value":">= 2.0.0, < 2.0.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp","refsource":"MISC","name":"https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp"},{"url":"https://github.com/nautobot/nautobot/pull/4692","refsource":"MISC","name":"https://github.com/nautobot/nautobot/pull/4692"},{"url":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71","refsource":"MISC","name":"https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71"}]},"source":{"advisory":"GHSA-r2hw-74xv-4gqp","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-25 18:17:00","lastModifiedDate":"2023-11-01 16:25:00","problem_types":["CWE-312"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.0.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}