CVE-2020-10590

Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:2.41.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://blog.replicated.com - Vendor Advisory () https://blog.replicated.com - Vendor Advisory
References () https://gradle.com/enterprise/releases/2019.5/#changes - Third Party Advisory () https://gradle.com/enterprise/releases/2019.5/#changes - Third Party Advisory
References () https://www.replicated.com/security/advisories/CVE-2020-10590 - Vendor Advisory () https://www.replicated.com/security/advisories/CVE-2020-10590 - Vendor Advisory

Information

Published : 2021-07-30 14:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10590

Mitre link : CVE-2020-10590

CVE.ORG link : CVE-2020-10590


JSON object : View

Products Affected

replicated

  • replicated_classic