
CVE-2019-3879
https://notcve.org/view.php?id=CVE-2019-3879
25 Mar 2019 — It was discovered that in the ovirt's REST API before version 4.3.2.1, RemoveDiskCommand is triggered as an internal command, meaning the permission validation that should be performed against the calling user is skipped. A user with low privileges (eg Basic Operations) could exploit this flaw to delete disks attached to guests. Se ha observado que en la API REST de ovirt, en versiones anteriores a la 4.3.2.1, RemoveDiskCommand se activa como un comando interno, haciendo que se omita la validación del permi... • http://www.securityfocus.com/bid/107561 • CWE-862: Missing Authorization •

CVE-2017-15113
https://notcve.org/view.php?id=CVE-2017-15113
27 Jul 2018 — ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues. ovirt-engine en versiones anteriores a la 4.1.7.6 con el nivel de registro configurado en DEBUG incluye contraseñas en el archivo de registro sin enmascarar. Solo los administradores pueden cambiar ... • http://www.securityfocus.com/bid/101933 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer CWE-532: Insertion of Sensitive Information into Log File •

CVE-2018-1072 – ovirt-engine-setup: unfiltered db password in engine-backup log
https://notcve.org/view.php?id=CVE-2018-1072
26 Jun 2018 — ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords. ovirt-engine en versiones anteriores a ovirt 4.2.2 es vulnerable a una exposición de información mediante archivos de log. Cuando engine-backup se ejecutaba con una de las opciones "--provision*db", el nombre... • https://access.redhat.com/errata/RHSA-2018:2071 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2018-1075 – ovirt-engine: Unfiltered password when choosing manual db provisioning
https://notcve.org/view.php?id=CVE-2018-1075
12 Jun 2018 — ovirt-engine up to version 4.2.3 is vulnerable to an unfiltered password when choosing manual db provisioning. When engine-setup was run and one chooses to provision the database manually or connect to a remote database, the password input was logged in cleartext during the verification step. Sharing the provisioning log might inadvertently leak database passwords. ovirt-engine hasta la versión 4.2.3 es vulnerable a una contraseña no filtrada al elegir el provisionamiento db manual. Cuando se ejecuta engine... • https://access.redhat.com/errata/RHSA-2018:2071 • CWE-522: Insufficiently Protected Credentials CWE-532: Insertion of Sensitive Information into Log File •

CVE-2018-1074
https://notcve.org/view.php?id=CVE-2018-1074
26 Apr 2018 — ovirt-engine API and administration web portal before versions 4.2.2.5, 4.1.11.2 is vulnerable to an exposure of Power Management credentials, including cleartext passwords to Host Administrators. A Host Administrator could use this flaw to gain access to the power management systems of hosts they control. La API y el portal de administración web de ovirt-engine en versiones anteriores a la 4.2.2.5 y la 4.1.11.2 es vulnerable a una exposición de credenciales de Power Management, incluyendo contraseñas en te... • https://access.redhat.com/errata/RHBA-2018:1219 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVE-2014-7851
https://notcve.org/view.php?id=CVE-2014-7851
16 Oct 2017 — oVirt 3.2.2 through 3.5.0 does not invalidate the restapi session after logout from the webadmin, which allows remote authenticated users with knowledge of another user's session data to gain that user's privileges by replacing their session token with that of another user. oVirt 3.2.2 hasta la versión 3.5.0 no invalida la sesión restapi tras cerrar sesión desde el webadmin, lo que permite que usuarios remotos autenticados con conocimientos sobre los datos de sesión de otro usuario obtengan los privilegios ... • https://bugzilla.redhat.com/show_bug.cgi?id=1161730 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-6341
https://notcve.org/view.php?id=CVE-2016-6341
20 Apr 2017 — oVirt Engine before 4.0.3 does not include DWH_DB_PASSWORD in the list of keys to hide in log files, which allows local users to obtain sensitive password information by reading engine log files. oVirt Engine en versiones anteriores a 4.0.3 no incluye DWH_DB_PASSWORD en el listado de claves que se ocultan en los archivos de registro, lo que permite a usuarios locales obtener información sensible de contraseñas mediante la lectura de los archivos de registro de motor. • http://www.securityfocus.com/bid/92665 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2014-0154 – ovirt-engine-webadmin: HttpOnly flag is not included when the session ID is set
https://notcve.org/view.php?id=CVE-2014-0154
12 Feb 2015 — oVirt Engine before 3.5.0 does not include the HTTPOnly flag in a Set-Cookie header for the session IDs, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. oVirt Engine anterior a 3.5.0 no incluye el indicador HTTPOnly en una cabecera Set-Cookie para los identificadores de la sesión, lo que facilita a atacantes remotos obtener información potencialmente sensible a través del acceso de secuencias de comandos a esta cookie. It was found tha... • http://rhn.redhat.com/errata/RHSA-2015-0158.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVE-2014-0152 – ovirt-engine-webadmin: session fixation
https://notcve.org/view.php?id=CVE-2014-0152
08 Sep 2014 — Session fixation vulnerability in the web admin interface in oVirt 3.4.0 and earlier allows remote attackers to hijack web sessions via unspecified vectors. Vulnerabilidad de fijación de sesión en la interfaz de administración web en oVirt 3.4.0 y anteriores permite a atacantes remotos secuestrar sesiones web a través de vectores no especificados. • http://gerrit.ovirt.org/#/c/25959 • CWE-384: Session Fixation •

CVE-2014-0153 – ovirt-engine-api: session ID stored in HTML5 local storage
https://notcve.org/view.php?id=CVE-2014-0153
08 Sep 2014 — The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page. La API REST en oVirt 3.4.0 y anteriores almacena los IDs de sesiones en almacenaje local HTML5, lo que permite a atacantes remotos obtener información sensible a través de una página web manipulada. • http://gerrit.ovirt.org/#/c/25987 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •