Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cxqv-ww34-rc46

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An internal product security audit of LXCO, prior to version 1.2.2, discovered that optional passwords, if specified, for the Syslog and SMTP forwarders are written to an internal LXCO log file in clear text. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file.

An internal product security audit of LXCO, prior to version 1.2.2, discovered that optional passwords, if specified, for the Syslog and SMTP forwarders are written to an internal LXCO log file in clear text. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file.

EPSS

Процентиль: 39%
0.00171
Низкий

Дефекты

CWE-319

Связанные уязвимости

CVSS3: 4.9
nvd
почти 5 лет назад

An internal product security audit of LXCO, prior to version 1.2.2, discovered that optional passwords, if specified, for the Syslog and SMTP forwarders are written to an internal LXCO log file in clear text. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file.

EPSS

Процентиль: 39%
0.00171
Низкий

Дефекты

CWE-319