Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4643-vgh5-4r2c

Опубликовано: 21 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

EPSS

Процентиль: 12%
0.00041
Низкий

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

CVSS3: 7.8
redhat
больше 15 лет назад

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

CVSS3: 5.5
nvd
больше 4 лет назад

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

CVSS3: 5.5
debian
больше 4 лет назад

stonith-ng in pacemaker and cluster-glue passed passwords as commandli ...

EPSS

Процентиль: 12%
0.00041
Низкий

Дефекты

CWE-287