ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:2071 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1072 | Issue Tracking Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2071 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1072 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.0 |
References | () https://access.redhat.com/errata/RHSA-2018:2071 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1072 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-06-26 18:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1072
Mitre link : CVE-2018-1072
CVE.ORG link : CVE-2018-1072
JSON object : View
Products Affected
redhat
- enterprise_virtualization_manager
ovirt
- ovirt
CWE
CWE-532
Insertion of Sensitive Information into Log File