{"id":"CVE-2020-14301","details":"An information disclosure vulnerability was found in libvirt in versions before 6.3.0. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw allows an attacker to access potentially sensitive information in the domain configuration via the `dumpxml` command.","modified":"2026-04-10T04:22:33.446505Z","published":"2021-05-27T20:15:07.727Z","related":["ALSA-2020:4676"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210629-0007/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848640"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvirt/libvirt","events":[{"introduced":"07bb8ff4dd0ca0224754c582390f4a873597c4b9"},{"fixed":"e8aa9f0dfcae0ced905e08dd3b1a9047c808cca7"},{"introduced":"0"},{"last_affected":"5f6025945bf0f98debcd4ad8cf064e9cadca1cc9"},{"introduced":"0"},{"last_affected":"0c92b0842630a112c547e030f7f6a48033eccb16"},{"introduced":"0"},{"last_affected":"5f6025945bf0f98debcd4ad8cf064e9cadca1cc9"},{"introduced":"0"},{"last_affected":"0c92b0842630a112c547e030f7f6a48033eccb16"},{"introduced":"0"},{"last_affected":"5f6025945bf0f98debcd4ad8cf064e9cadca1cc9"},{"introduced":"0"},{"last_affected":"0c92b0842630a112c547e030f7f6a48033eccb16"},{"introduced":"0"},{"last_affected":"0c92b0842630a112c547e030f7f6a48033eccb16"},{"introduced":"0"},{"last_affected":"0c92b0842630a112c547e030f7f6a48033eccb16"},{"introduced":"0"},{"last_affected":"0c92b0842630a112c547e030f7f6a48033eccb16"},{"introduced":"0"},{"last_affected":"0c92b0842630a112c547e030f7f6a48033eccb16"}],"database_specific":{"versions":[{"introduced":"6.2.0"},{"fixed":"6.3.0"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"8.4"}]}}],"versions":["CVE-2020-14339","CVE-2020-25637","CVE-2021-3631","CVE-2021-3667","CVE-2022-0897","v6.10.0","v6.10.0-rc1","v6.10.0-rc2","v6.2.0","v6.3.0","v6.3.0-rc1","v6.4.0","v6.4.0-rc1","v6.5.0","v6.5.0-rc1","v6.5.0-rc2","v6.6.0","v6.6.0-rc1","v6.7.0","v6.7.0-rc1","v6.7.0-rc2","v6.8.0","v6.8.0-rc1","v6.8.0-rc2","v6.9.0","v6.9.0-rc1","v6.9.0-rc2","v7.0.0","v7.0.0-rc1","v7.0.0-rc2","v7.1.0","v7.1.0-rc1","v7.1.0-rc2","v7.10.0","v7.10.0-rc1","v7.10.0-rc2","v7.2.0","v7.2.0-rc1","v7.2.0-rc2","v7.3.0","v7.3.0-rc1","v7.3.0-rc2","v7.4.0","v7.4.0-rc1","v7.4.0-rc2","v7.5.0","v7.5.0-rc1","v7.5.0-rc2","v7.6.0","v7.6.0-rc1","v7.6.0-rc2","v7.7.0","v7.7.0-rc1","v7.7.0-rc2","v7.8.0","v7.8.0-rc1","v7.8.0-rc2","v7.9.0","v7.9.0-rc1","v7.9.0-rc2","v8.0.0","v8.0.0-rc1","v8.0.0-rc2","v8.1.0","v8.1.0-rc1","v8.1.0-rc2","v8.2.0","v8.2.0-rc1","v8.2.0-rc2","v8.3.0","v8.3.0-rc1","v8.3.0-rc2","v8.4.0","v8.4.0-rc1","v8.4.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14301.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}