CVE-2024-6916

5.9 MEDIUM

📋 TL;DR

CVE-2024-6916 is an information disclosure vulnerability in Zowe CLI that allows local, privileged users to view securely stored properties in cleartext using the '--show-inputs-only' flag. This affects systems where Zowe CLI is installed and users have local access with sufficient privileges. The vulnerability exposes sensitive configuration data that should remain encrypted.

💻 Affected Systems

Products:
  • Zowe CLI
Versions: All versions prior to the fix
Operating Systems: All supported platforms (Linux, Windows, macOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Zowe CLI to be installed and configured with stored secure properties. The vulnerability is triggered when using the '--show-inputs-only' flag with appropriate commands.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged local attackers obtain cleartext credentials, API keys, or other sensitive configuration data, leading to lateral movement, privilege escalation, or data exfiltration.

🟠

Likely Case

Authorized users with local access inadvertently or intentionally expose stored secrets during troubleshooting or normal operations.

🟢

If Mitigated

Minimal impact if proper access controls limit local administrative privileges and sensitive data is stored outside Zowe CLI's configuration.

🌐 Internet-Facing: LOW - This requires local access to the system, not remote exploitation.
🏢 Internal Only: MEDIUM - Internal users with local administrative access can exploit this to gain sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple command execution by privileged local users.

Exploitation requires local access and knowledge of Zowe CLI commands. No authentication bypass needed as it targets local users with sufficient privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check the Zowe CLI GitHub repository for specific patched versions

Vendor Advisory: https://github.com/zowe/zowe-cli/packages/imperative

Restart Required: No

Instructions:

1. Update Zowe CLI to the latest version from the official repository. 2. Verify the update using 'zowe --version'. 3. Review and rotate any exposed credentials stored in Zowe CLI configuration.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local administrative access to systems running Zowe CLI to trusted users only.

Avoid Using --show-inputs-only Flag

all

Educate users to avoid using the vulnerable flag when working with secure properties.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can run Zowe CLI commands locally.
  • Store sensitive credentials in external secure vaults instead of Zowe CLI's configuration.

🔍 How to Verify

Check if Vulnerable:

Check if Zowe CLI is installed and if the '--show-inputs-only' flag is available in commands that handle secure properties.

Check Version:

zowe --version

Verify Fix Applied:

After updating, test that the '--show-inputs-only' flag no longer displays secure properties in cleartext.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing use of '--show-inputs-only' flag in Zowe CLI commands
  • Unexpected access to secure configuration files

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for process execution logs containing 'zowe' and '--show-inputs-only' flags on monitored systems.

🔗 References

📤 Share & Export