Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
References
Link | Resource |
---|---|
https://blog.replicated.com | Vendor Advisory |
https://gradle.com/enterprise/releases/2019.5/#changes | Third Party Advisory |
https://www.replicated.com/security/advisories/CVE-2020-10590 | Vendor Advisory |
https://blog.replicated.com | Vendor Advisory |
https://gradle.com/enterprise/releases/2019.5/#changes | Third Party Advisory |
https://www.replicated.com/security/advisories/CVE-2020-10590 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.replicated.com - Vendor Advisory | |
References | () https://gradle.com/enterprise/releases/2019.5/#changes - Third Party Advisory | |
References | () https://www.replicated.com/security/advisories/CVE-2020-10590 - Vendor Advisory |
Information
Published : 2021-07-30 14:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10590
Mitre link : CVE-2020-10590
CVE.ORG link : CVE-2020-10590
JSON object : View
Products Affected
replicated
- replicated_classic
CWE