An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Nov/35 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/101997 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Nov/35 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/101997 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Nov/35 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/101997 - Third Party Advisory, VDB Entry |
Information
Published : 2017-11-28 07:29
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8001
Mitre link : CVE-2017-8001
CVE.ORG link : CVE-2017-8001
JSON object : View
Products Affected
dell
- emc_scaleio
linux
- linux_kernel
CWE
CWE-532
Insertion of Sensitive Information into Log File