6 results (0.019 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev Se ha detectado que ovirt-log-collector/sosreport recoge la contraseña de administrador de RHV sin filtrar. Corregido en: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev A flaw was found in the ovirt-log-collector, which led to the logging of plaintext passwords in the log file. This flaw allows an attacker with sufficient privileges to read the log file, leading to a loss of confidentiality. • https://github.com/sosreport/sos/pull/2947 https://access.redhat.com/security/cve/CVE-2022-2806 https://bugzilla.redhat.com/show_bug.cgi?id=2080005 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

sosreport 3.2 uses weak permissions for generated sosreport archives, which allows local users with access to /var/tmp/ to obtain sensitive information by reading the contents of the archive. sosreport versión 3.2, utiliza permisos débiles para los archivos de sosreport generados, lo que permite a los usuarios locales con acceso a /var/tmp/ obtener información confidencial mediante la lectura del contenido del archivo. • https://bugzilla.redhat.com/show_bug.cgi?id=1218658 https://github.com/sosreport/sos/commit/d7759d3ddae5fe99a340c88a1d370d65cfa73fd6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or gain privileges via a symlink attack on an archive file in a temporary directory, as demonstrated by sosreport-$hostname-$date.tar in /tmp/sosreport-$hostname-$date. sosreport en las versiones 3.x de SoS permite que usuarios locales ibtengan información sensible de archivos sosreport u obtener privilegios mediante un ataque de vínculo simbólico o un archivo de archivado en un directorio temporal. Esto lo demuestra sosreport-$hostname-$date.tar en /tmp/sosreport-$hostname-$date. An insecure temporary file use flaw was found in the way sos created certain sosreport files. A local attacker could possibly use this flaw to perform a symbolic link attack to reveal the contents of sosreport files, or in some cases modify arbitrary files and escalate their privileges on the system. • http://rhn.redhat.com/errata/RHSA-2016-0152.html http://rhn.redhat.com/errata/RHSA-2016-0188.html http://www.securityfocus.com/bid/83162 http://www.ubuntu.com/usn/USN-2845-1 https://access.redhat.com/errata/RHSA-2016:0152 https://access.redhat.com/errata/RHSA-2016:0188 https://bugzilla.redhat.com/show_bug.cgi?id=1282542 https://github.com/sosreport/sos/issues/696 https://access.redhat.com/security/cve/CVE-2015-7529 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-377: Insecure Temporary File •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream. sosreport en Red Hat sos 1.7 y versiones anteriores en Red Hat Enterprise Linux (RHEL) 5 produce un archivo con un fichero fstab conteniendo potencialmente contraseñas en texto plano, y carece de una advertencia sobre la revisión de este fichero para detectar las contraseñas incluidas, lo que podría permitir a atacantes remotos obtener información sensible aprovechando el acceso al flujo de datos de soporte técnico. • http://openwall.com/lists/oss-security/2014/05/29/6 http://openwall.com/lists/oss-security/2014/05/30/3 http://www.ubuntu.com/usn/USN-2845-1 https://bugzilla.redhat.com/show_bug.cgi?id=1102633 • CWE-255: Credentials Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The sosreport utility in the Red Hat sos package before 2.2-29 does not remove the root user password information from the Kickstart configuration file (/root/anaconda-ks.cfg) when creating an archive of debugging information, which might allow attackers to obtain passwords or password hashes. La utilidad sosreport del paquete sos de Red Hat anteriores a 2.2-29 no elimina información de la contraseña del usuario administrador del archivo de configuración Kickstart (/root/anaconda-ks.cfg) cuando se crea un archivo con información de configuración, lo que puede permitir a atacantes obtener contraseñas o hashes de contraseñas. • http://rhn.redhat.com/errata/RHSA-2012-0958.html http://rhn.redhat.com/errata/RHSA-2013-1121.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/54116 https://exchange.xforce.ibmcloud.com/vulnerabilities/76468 https://access.redhat.com/security/cve/CVE-2012-2664 https://bugzilla.redhat.com/show_bug.cgi?id=826884 • CWE-255: Credentials Management Errors •