RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. Users' session information is logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107443 | |
https://seclists.org/fulldisclosure/2019/Mar/19 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/107443 | |
https://seclists.org/fulldisclosure/2019/Mar/19 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 7.8 |
References | () http://www.securityfocus.com/bid/107443 - | |
References | () https://seclists.org/fulldisclosure/2019/Mar/19 - Mailing List, Third Party Advisory |
Information
Published : 2019-03-13 21:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3715
Mitre link : CVE-2019-3715
CVE.ORG link : CVE-2019-3715
JSON object : View
Products Affected
rsa
- archer_grc_platform
CWE
CWE-532
Insertion of Sensitive Information into Log File