Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-69mv-3642-wj3w

Опубликовано: 23 июл. 2018
Источник: github
Github: Прошло ревью

Описание

Low severity vulnerability that affects sensu

The sensu rubygem prior to version 1.2.0 contains a CWE-522 (Insufficiently Protected Credentials) flaw that can result in sensitive configuration data (e.g. passwords) being logged in clear-text.

Users are advised to upgrade to rubygem version 1.2.1 or later.

Пакеты

Наименование

sensu

rubygems
Затронутые версииВерсия исправления

< 1.2.1

1.2.1

EPSS

Процентиль: 63%
0.0045
Низкий

Связанные уязвимости

CVSS3: 5.5
redhat
около 8 лет назад

Sensu, Inc. Sensu Core version Before 1.2.0 & before commit 46ff10023e8cbf1b6978838f47c51b20b98fe30b contains a CWE-522 vulnerability in Sensu::Utilities.redact_sensitive() that can result in sensitive configuration data (e.g. passwords) may be logged in clear-text. This attack appear to be exploitable via victims with configuration matching a specific pattern will observe sensitive data outputted in their service log files. This vulnerability appears to have been fixed in 1.2.1 and later, after commit 46ff10023e8cbf1b6978838f47c51b20b98fe30b.

CVSS3: 9.8
nvd
почти 8 лет назад

Sensu, Inc. Sensu Core version Before 1.2.0 & before commit 46ff10023e8cbf1b6978838f47c51b20b98fe30b contains a CWE-522 vulnerability in Sensu::Utilities.redact_sensitive() that can result in sensitive configuration data (e.g. passwords) may be logged in clear-text. This attack appear to be exploitable via victims with configuration matching a specific pattern will observe sensitive data outputted in their service log files. This vulnerability appears to have been fixed in 1.2.1 and later, after commit 46ff10023e8cbf1b6978838f47c51b20b98fe30b.

CVSS3: 9.8
debian
почти 8 лет назад

Sensu, Inc. Sensu Core version Before 1.2.0 & before commit 46ff10023e ...

EPSS

Процентиль: 63%
0.0045
Низкий