389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:3401 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871 | Issue Tracking Mitigation Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html | Mailing List Third Party Advisory |
https://pagure.io/389-ds-base/issue/49789 | Issue Tracking Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3401 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871 | Issue Tracking Mitigation Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html | Mailing List Third Party Advisory |
https://pagure.io/389-ds-base/issue/49789 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 3.8 |
References | () https://access.redhat.com/errata/RHSA-2019:3401 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871 - Issue Tracking, Mitigation, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html - Mailing List, Third Party Advisory | |
References | () https://pagure.io/389-ds-base/issue/49789 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-07-18 13:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10871
Mitre link : CVE-2018-10871
CVE.ORG link : CVE-2018-10871
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- 389_directory_server
CWE
CWE-312
Cleartext Storage of Sensitive Information