Vulnerability Name: | CVE-2019-10195 (CCN-172430) | ||||||||||||||||||||||||
Assigned: | 2019-11-26 | ||||||||||||||||||||||||
Published: | 2019-11-26 | ||||||||||||||||||||||||
Updated: | 2020-02-05 | ||||||||||||||||||||||||
Summary: | A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed. | ||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.0 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.0 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-532 CWE-532 CWE-200 CWE-200 | ||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-10195 Source: REDHAT Type: UNKNOWN RHBA-2019:4268 Source: REDHAT Type: UNKNOWN RHSA-2020:0378 Source: CCN Type: Red Hat Bugzilla - Bug 1726223 CVE-2019-10195 IPA: batch API logging user passwords to /var/log/httpd/error_log Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195 Source: XF Type: UNKNOWN freeipa-cve201910195-info-disc(172430) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-c64e1612f5 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-8e9093da55 Source: CCN Type: FreeIPA Web site FreeIPA Source: MISC Type: Release Notes https://www.freeipa.org/page/Releases/4.6.7 Source: MISC Type: Release Notes https://www.freeipa.org/page/Releases/4.7.4 Source: MISC Type: Release Notes https://www.freeipa.org/page/Releases/4.8.3 | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |