RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107406 | Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2019/Mar/19 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/107406 | Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2019/Mar/19 | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107406 - Third Party Advisory, VDB Entry | |
References | () https://seclists.org/fulldisclosure/2019/Mar/19 - Mailing List, Third Party Advisory |
Information
Published : 2019-03-13 21:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3716
Mitre link : CVE-2019-3716
CVE.ORG link : CVE-2019-3716
JSON object : View
Products Affected
rsa
- archer_grc_platform
CWE
CWE-532
Insertion of Sensitive Information into Log File