Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10139

Опубликовано: 17 мая 2019
Источник: redhat
CVSS3: 5.6

Описание

During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file /var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-522
https://bugzilla.redhat.com/show_bug.cgi?id=1709829cockpit-ovirt: admin and appliance passwords saved in plain text variable file during HE deployment

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 6 лет назад

During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted.

CVSS3: 7.8
github
больше 3 лет назад

During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted.

CVSS3: 7.8
fstec
больше 6 лет назад

Уязвимость компонента /var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var плагина cockpit-ovirt программного средства управления виртуализацией серверов и рабочих станций Red Hat Virtualization, позволяющая нарушителю раскрыть учетные данные привилегированного пользователя

5.6 Medium

CVSS3