Описание
RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.
Ссылки
- Third Party AdvisoryVDB Entry
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.5.2.0 (исключая)
cpe:2.3:a:rsa:archer_grc_platform:*:*:*:*:*:*:*:*
EPSS
Процентиль: 16%
0.00051
Низкий
7.8 High
CVSS3
7.8 High
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-532
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.
EPSS
Процентиль: 16%
0.00051
Низкий
7.8 High
CVSS3
7.8 High
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-532