Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 in `FacebookAuthFilter.java` results in a full request URL being logged during a failed request to a Facebook user profile. The log includes the user's access token in plain text. Since WARN-level logs are often retained in production and accessible to operators or log aggregation systems, this poses a risk of token exposure. Version 1.50.8 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 05 Jun 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 in `FacebookAuthFilter.java` results in a full request URL being logged during a failed request to a Facebook user profile. The log includes the user's access token in plain text. Since WARN-level logs are often retained in production and accessible to operators or log aggregation systems, this poses a risk of token exposure. Version 1.50.8 fixes the issue. | |
Title | Para Inserts Sensitive Information into Log File for Facebook authentication | |
Weaknesses | CWE-532 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-05T16:40:27.978Z
Updated: 2025-06-17T13:54:23.657Z
Reserved: 2025-05-29T16:34:07.176Z
Link: CVE-2025-49009

Updated: 2025-06-17T13:54:17.098Z

Status : Awaiting Analysis
Published: 2025-06-05T17:15:29.570
Modified: 2025-06-05T20:12:23.777
Link: CVE-2025-49009

No data.