A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2998 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2020:0727 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212 | Issue Tracking Mitigation Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220210-0017/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2019-10-02 19:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-10212
Mitre link : CVE-2019-10212
CVE.ORG link : CVE-2019-10212
JSON object : View
Products Affected
redhat
- enterprise_linux
- jboss_data_grid
- undertow
- jboss_enterprise_application_platform
- openshift_application_runtimes
- jboss_fuse
- single_sign-on
netapp
- active_iq_unified_manager
CWE
CWE-532
Insertion of Sensitive Information into Log File