2 results (0.009 seconds)

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

An information-disclosure flaw was found in the way Heketi before 10.1.0 logs sensitive information. This flaw allows an attacker with local access to the Heketi server to read potentially sensitive information such as gluster-block passwords. Se encontró un fallo en la divulgación de información en la forma en que Heketi versiones anteriores a 10.1.0 registra información confidencial. Este fallo permite a un atacante con acceso local al servidor de Heketi leer información potencialmente confidencial, tal y como contraseñas de gluster-block An information-disclosure flaw was found in the way Heketi logs sensitive information. This flaw allows an attacker with local access to the Heketi server, to read potentially sensitive information, such as gluster-block passwords. • https://bugzilla.redhat.com/show_bug.cgi?id=1845387 https://github.com/heketi/heketi/releases/tag/v10.1.0 https://access.redhat.com/security/cve/CVE-2020-10763 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file. Se ha detectado una vulnerabilidad de acceso en Heketi 5, donde el archivo de configuración heketi.json puede ser leído por cualquier usuario. Un atacante que tenga acceso local al servidor Heketi podría leer contraseñas en texto plano del archivo heketi.json. An access flaw was found in heketi, where the heketi.json configuration file was world readable. • https://access.redhat.com/errata/RHSA-2017:3481 https://access.redhat.com/security/cve/CVE-2017-15104 https://bugzilla.redhat.com/show_bug.cgi?id=1510149 https://github.com/heketi/heketi/releases/tag/v5.0.1 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-552: Files or Directories Accessible to External Parties •