Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2g9f-v599-7rv2

Опубликовано: 02 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.4
CVSS3: 5.5

Описание

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."

EPSS

Процентиль: 2%
0.00014
Низкий

9.4 Critical

CVSS4

5.5 Medium

CVSS3

Дефекты

CWE-256

Связанные уязвимости

CVSS3: 5.5
nvd
4 месяца назад

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."

EPSS

Процентиль: 2%
0.00014
Низкий

9.4 Critical

CVSS4

5.5 Medium

CVSS3

Дефекты

CWE-256