Описание
keycloak-httpd-client-install versions before 0.8 allow users to insecurely pass password through command line, leaking it via command history and process info to other local users.
In keycloak-http-client-install prior to version 0.8, the admin password could be provided through a command-line argument. This might result in the password being leaked through shell history, or becoming visible to a local attacker at the time the program is running.
Отчет
Red Hat Product Security has rated this issue as having security impact of Low. This issue may be fixed in a future version of Red Hat Enterprise Linux. OpenStack users please note, this issue is present in:
- Red Hat OpenStack Platform 9.0 (Mitaka)
- Red Hat OpenStack Platform 10.0 (Newton)
- Red Hat OpenStack Platform 11.0 (Ocata) If a fixed version of keycloak-httpd-client-install is made available in Red Hat Enterprise Linux, OpenStack customers should consume this package directly from the Red Hat Enterprise Linux channel (this occurs during normal updates).
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenStack Platform 10 (Newton) | keycloak-httpd-client-install | Will not fix | ||
| Red Hat OpenStack Platform 11 (Ocata) | keycloak-httpd-client-install | Will not fix | ||
| Red Hat OpenStack Platform 9 (Mitaka) | keycloak-httpd-client-install | Will not fix | ||
| Red Hat Enterprise Linux 7 | keycloak-httpd-client-install | Fixed | RHSA-2019:2137 | 06.08.2019 |
Показывать по
Дополнительная информация
Статус:
2.8 Low
CVSS3
Связанные уязвимости
keycloak-httpd-client-install versions before 0.8 allow users to insecurely pass password through command line, leaking it via command history and process info to other local users.
keycloak-httpd-client-install versions before 0.8 allow users to insec ...
ELSA-2019-2137: keycloak-httpd-client-install security, bug fix, and enhancement update (LOW)
2.8 Low
CVSS3