CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
4Description
IBM Knowledge Catalog Standard Cartridge 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1, 5.1.1, 5,1.2, 5.1.3, 5.2.0, 5.2.1 stores potentially sensitive information in log files that could be read by a local privileged user.
Analysis
IBM Knowledge Catalog Standard Cartridge versions 5.0.0 through 5.2.1 improperly store sensitive information in log files that can be read by local privileged users. An attacker with high privileges on the affected system can access these logs to disclose confidential data without requiring user interaction. While no active exploitation in the wild or public proof-of-concept has been reported, a vendor patch is available and should be applied promptly.
Technical Context
This vulnerability is classified as CWE-532 (Insertion of Sensitive Information into Log File), a well-established information disclosure weakness in which applications fail to properly sanitize or protect sensitive data before writing to log files. IBM Knowledge Catalog Standard Cartridge, an enterprise data governance and metadata management tool, writes potentially sensitive information (such as credentials, tokens, or personal identifiable information) to locally accessible log files without appropriate redaction or encryption. The affected products are identified via CPE cpe:2.3:a:ibm:knowledge_catalog_standard_cartridge with no version constraints in the CPE string, confirming the vulnerability spans multiple minor and patch versions from 5.0.0 through 5.2.1. Local privileged users with file system access can bypass normal application access controls to read these unprotected logs.
Affected Products
IBM Knowledge Catalog Standard Cartridge versions 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1, 5.1.1, 5.1.2, 5.1.3, 5.2.0, and 5.2.1 are affected, as confirmed by CPE cpe:2.3:a:ibm:knowledge_catalog_standard_cartridge. All versions from the 5.x line up to and including 5.2.1 contain the vulnerable log file handling behavior. A security patch is available from IBM; consult the vendor advisory at https://www.ibm.com/support/pages/node/7267542 for patched version availability and upgrade instructions.
Remediation
Upgrade IBM Knowledge Catalog Standard Cartridge to the patched version specified in the vendor advisory at https://www.ibm.com/support/pages/node/7267542. As an immediate interim control, restrict file system access to log directories to only the application service account and system administrators with legitimate operational need; prevent unprivileged users from reading application logs via file permissions (chmod 640 or more restrictive on Unix/Linux systems, or equivalent ACLs on Windows). Additionally, implement log redaction or masking rules to prevent sensitive data (credentials, API keys, PII) from being written to logs in the first place, and consider centralizing logs to a protected logging infrastructure with access controls. Monitor log file access patterns to detect unauthorized reads.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209040