CVE-2019-10194

Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts.
References
Link Resource
http://www.securityfocus.com/bid/109140 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:2499 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10194 Issue Tracking Vendor Advisory
http://www.securityfocus.com/bid/109140 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:2499 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10194 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ovirt:ovirt:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/109140 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/109140 - Broken Link, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:2499 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2499 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10194 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10194 - Issue Tracking, Vendor Advisory

Information

Published : 2019-07-11 19:15

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10194

Mitre link : CVE-2019-10194

CVE.ORG link : CVE-2019-10194


JSON object : View

Products Affected

ovirt

  • ovirt

redhat

  • virtualization_manager
CWE
CWE-532

Insertion of Sensitive Information into Log File