Описание
Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable permissions for default_values.yaml, which allows local users to obtain passwords and other sensitive information by reading the file.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse) | rubygem-kafo | Will not fix | ||
| Red Hat OpenStack Platform 4 | rubygem-kafo | Will not fix | ||
| Red Hat Satellite 6.0 | rubygem-kafo | Fixed | RHEA-2014:1175 | 10.09.2014 |
| Red Hat Satellite 6.0 | rubygem-kafo_parsers | Fixed | RHEA-2014:1175 | 10.09.2014 |
| Red Hat Satellite 6.0 | rubygem-kafo | Fixed | RHEA-2014:1175 | 10.09.2014 |
| Red Hat Satellite 6.0 | rubygem-kafo_parsers | Fixed | RHEA-2014:1175 | 10.09.2014 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-377
Дефект:
CWE-367
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1076335rubygem-kafo: temporary file creation vulnerability when creating /tmp/default_values.yaml
EPSS
Процентиль: 28%
0.00099
Низкий
4.6 Medium
CVSS2
Связанные уязвимости
nvd
больше 11 лет назад
Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable permissions for default_values.yaml, which allows local users to obtain passwords and other sensitive information by reading the file.
github
больше 3 лет назад
Kafo allows local users to obtain passwords and other sensitive information by reading default_values.yaml
EPSS
Процентиль: 28%
0.00099
Низкий
4.6 Medium
CVSS2