CVE-2019-10195
ipa: Batch API logging user passwords to /var/log/httpd/error_log
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
Se encontró un fallo en IPA, todas las versiones 4.6.x anteriores a la versión 4.6.7, todas las versiones 4.7.x anteriores a la 4.7.4 y todas las versiones 4.8.x anteriores a 4.8.3, en la manera en que la API de procesamiento por lotes de FreeIPA registró operaciones. Esto incluía pasar contraseñas de usuario en texto sin cifrar en los maestros de FreeIPA. El procesamiento por lotes de comandos con contraseñas como argumentos u opciones no se realiza por defecto en FreeIPA, pero es posible mediante componentes de terceros. Un atacante que tenga acceso a los registros del sistema en los maestros de FreeIPA podría usar este fallo para producir el contenido del archivo de registro con las contraseñas expuestas.
A flaw was found in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-03-27 CVE Reserved
- 2019-11-27 CVE Published
- 2024-08-04 CVE Updated
- 2024-11-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-532: Insertion of Sensitive Information into Log File
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195 | Issue Tracking | |
https://www.freeipa.org/page/Releases/4.6.7 | Release Notes | |
https://www.freeipa.org/page/Releases/4.7.4 | Release Notes | |
https://www.freeipa.org/page/Releases/4.8.3 | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freeipa Search vendor "Freeipa" | Freeipa Search vendor "Freeipa" for product "Freeipa" | >= 4.6.0 < 4.6.7 Search vendor "Freeipa" for product "Freeipa" and version " >= 4.6.0 < 4.6.7" | - |
Affected
| ||||||
Freeipa Search vendor "Freeipa" | Freeipa Search vendor "Freeipa" for product "Freeipa" | >= 4.7.0 < 4.7.4 Search vendor "Freeipa" for product "Freeipa" and version " >= 4.7.0 < 4.7.4" | - |
Affected
| ||||||
Freeipa Search vendor "Freeipa" | Freeipa Search vendor "Freeipa" for product "Freeipa" | >= 4.8.0 < 4.8.3 Search vendor "Freeipa" for product "Freeipa" and version " >= 4.8.0 < 4.8.3" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 30 Search vendor "Fedoraproject" for product "Fedora" and version "30" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 31 Search vendor "Fedoraproject" for product "Fedora" and version "31" | - |
Affected
|