Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-1662

Опубликовано: 14 июл. 2022
Источник: nvd
CVSS3: 5.5
EPSS Низкий

Описание

In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list while convert2rhel is running. However, this ansible playbook is only an example in the upstream repository and it is not shipped in officially supported versions of convert2rhel.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:convert2rhel_project:convert2rhel:0.24:*:*:*:*:*:*:*
cpe:2.3:a:convert2rhel_project:convert2rhel:0.25:*:*:*:*:*:*:*

EPSS

Процентиль: 13%
0.00043
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-200
CWE-200

Связанные уязвимости

CVSS3: 5.9
redhat
больше 3 лет назад

In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list while convert2rhel is running. However, this ansible playbook is only an example in the upstream repository and it is not shipped in officially supported versions of convert2rhel.

CVSS3: 5.5
github
больше 3 лет назад

In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list while convert2rhel is running. However, this ansible playbook is only an example in the upstream repository and it is not shipped in officially supported versions of convert2rhel.

EPSS

Процентиль: 13%
0.00043
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-200
CWE-200