In Pulp before version 2.16.2, secrets are passed into override_config when triggering a task and then become readable to all users with read access on the distributor/importer. An attacker with API access can then view these secrets.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:2927 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1090 | Issue Tracking Third Party Advisory |
https://pulp.plan.io/issues/3521 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2927 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1090 | Issue Tracking Third Party Advisory |
https://pulp.plan.io/issues/3521 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.5 |
References | () https://access.redhat.com/errata/RHSA-2018:2927 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1090 - Issue Tracking, Third Party Advisory | |
References | () https://pulp.plan.io/issues/3521 - Vendor Advisory |
Information
Published : 2018-06-18 14:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1090
Mitre link : CVE-2018-1090
CVE.ORG link : CVE-2018-1090
JSON object : View
Products Affected
pulpproject
- pulp
fedoraproject
- fedora
redhat
- satellite
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor