Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7510 (GCVE-0-2017-7510)
Vulnerability from cvelistv5 – Published: 2019-03-25 17:50 – Updated: 2024-08-05 16:04
VLAI?
EPSS
Summary
In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:04:11.915Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RHV",
"vendor": "[UNKNOWN]",
"versions": [
{
"status": "affected",
"version": "4.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-03-25T17:50:15",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2017-7510",
"datePublished": "2019-03-25T17:50:15",
"dateReserved": "2017-04-05T00:00:00",
"dateUpdated": "2024-08-05T16:04:11.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ovirt-engine:4.1.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD99FCF5-F433-4DED-98D5-954FB8E05DEF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.\"}, {\"lang\": \"es\", \"value\": \"En ovirt-engine 4.1, si un host fuera aprovisionado con un cloud-init, la contrase\\u00f1a root podr\\u00eda ser revelada a trav\\u00e9s de la interfaz REST.\"}]",
"id": "CVE-2017-7510",
"lastModified": "2024-11-21T03:32:02.760",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-03-25T18:29:00.387",
"references": "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-522\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-7510\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-03-25T18:29:00.387\",\"lastModified\":\"2024-11-21T03:32:02.760\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.\"},{\"lang\":\"es\",\"value\":\"En ovirt-engine 4.1, si un host fuera aprovisionado con un cloud-init, la contrase\u00f1a root podr\u00eda ser revelada a trav\u00e9s de la interfaz REST.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ovirt-engine:4.1.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD99FCF5-F433-4DED-98D5-954FB8E05DEF\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}"
}
}
RHEA-2017:1814
Vulnerability from csaf_redhat - Published: 2017-07-27 00:00 - Updated: 2025-11-21 17:24Summary
Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.4
Notes
Topic
An update is now available for Red Hat Virtualization Manager.
Details
The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.
The Manager is a JBoss Application Server application that provides several interfaces for accessing and interacting with the virtual environment, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).
Changes to the ovirt-engine component:
* Previously, users could use the REST API to add/edit affinity labels for virtual machines and hosts, but they could not view this information in the Administration Portal.
In this release, affinity label information is now available in the Administration Portal. It can be seen in the Add/Edit windows for virtual machines and hosts. The window displays all available affinity labels in the system, and for entities with assigned labels, those labels are selected. (BZ#1465862)
* Previously, when creating a new VLAN-tagged network, the Manager did not allow the same VLAN ID to be duplicated across various entities, such as networks and data centers.
In this release, it is now possible to use the same VLAN ID across multiple entities, as long as they are not used on the same interface on the hardware node. (BZ#1467058)
* Previously, if a host is in maintenance mode and a user calls GET /ovirt-engine/api/hosts/64fc087f-821b-429a-b274-5e8597a88f3d/storage through the REST API, the Manager would try to call getDeviceList on the host, and as a result it would be fenced.
In this release, a validation has been added which first checks to see if the host is in maintenance mode. The Manager will only call getDeviceList if the host is up. (BZ#1468999)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Manager.",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.\n\nThe Manager is a JBoss Application Server application that provides several interfaces for accessing and interacting with the virtual environment, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).\n\nChanges to the ovirt-engine component:\n\n* Previously, users could use the REST API to add/edit affinity labels for virtual machines and hosts, but they could not view this information in the Administration Portal.\n\nIn this release, affinity label information is now available in the Administration Portal. It can be seen in the Add/Edit windows for virtual machines and hosts. The window displays all available affinity labels in the system, and for entities with assigned labels, those labels are selected. (BZ#1465862)\n\n* Previously, when creating a new VLAN-tagged network, the Manager did not allow the same VLAN ID to be duplicated across various entities, such as networks and data centers.\n\nIn this release, it is now possible to use the same VLAN ID across multiple entities, as long as they are not used on the same interface on the hardware node. (BZ#1467058)\n\n* Previously, if a host is in maintenance mode and a user calls GET /ovirt-engine/api/hosts/64fc087f-821b-429a-b274-5e8597a88f3d/storage through the REST API, the Manager would try to call getDeviceList on the host, and as a result it would be fenced.\nIn this release, a validation has been added which first checks to see if the host is in maintenance mode. The Manager will only call getDeviceList if the host is up. (BZ#1468999)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2017:1814",
"url": "https://access.redhat.com/errata/RHEA-2017:1814"
},
{
"category": "external",
"summary": "1418683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418683"
},
{
"category": "external",
"summary": "1463698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463698"
},
{
"category": "external",
"summary": "1465862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465862"
},
{
"category": "external",
"summary": "1467058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1467058"
},
{
"category": "external",
"summary": "1468968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468968"
},
{
"category": "external",
"summary": "1468999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468999"
},
{
"category": "external",
"summary": "1470802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhea-2017_1814.json"
}
],
"title": "Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.4",
"tracking": {
"current_release_date": "2025-11-21T17:24:05+00:00",
"generator": {
"date": "2025-11-21T17:24:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHEA-2017:1814",
"initial_release_date": "2017-07-27T00:00:00+00:00",
"revision_history": [
{
"date": "2017-07-27T00:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-07-27T17:59:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:24:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization Manager 4.1",
"product": {
"name": "Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl-javadoc@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-lib@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-userportal@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"product_id": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.4.2-0.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"product": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"product_id": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.4.2-0.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.src as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src"
},
"product_reference": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7510",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1456590"
}
],
"notes": [
{
"category": "description",
"text": "It is reported that the RHV 4 REST API exposes data used in cloud-init which can include the root password used when creating a system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "4: ovirt-engine exposes cloud-init root password via REST API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7510"
},
{
"category": "external",
"summary": "RHBZ#1456590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1456590"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7510",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7510"
}
],
"release_date": "2017-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-07-27T00:00:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2017:1814"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "4: ovirt-engine exposes cloud-init root password via REST API"
}
]
}
RHEA-2017_1814
Vulnerability from csaf_redhat - Published: 2017-07-27 00:00 - Updated: 2024-11-14 23:32Summary
Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.4
Notes
Topic
An update is now available for Red Hat Virtualization Manager.
Details
The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.
The Manager is a JBoss Application Server application that provides several interfaces for accessing and interacting with the virtual environment, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).
Changes to the ovirt-engine component:
* Previously, users could use the REST API to add/edit affinity labels for virtual machines and hosts, but they could not view this information in the Administration Portal.
In this release, affinity label information is now available in the Administration Portal. It can be seen in the Add/Edit windows for virtual machines and hosts. The window displays all available affinity labels in the system, and for entities with assigned labels, those labels are selected. (BZ#1465862)
* Previously, when creating a new VLAN-tagged network, the Manager did not allow the same VLAN ID to be duplicated across various entities, such as networks and data centers.
In this release, it is now possible to use the same VLAN ID across multiple entities, as long as they are not used on the same interface on the hardware node. (BZ#1467058)
* Previously, if a host is in maintenance mode and a user calls GET /ovirt-engine/api/hosts/64fc087f-821b-429a-b274-5e8597a88f3d/storage through the REST API, the Manager would try to call getDeviceList on the host, and as a result it would be fenced.
In this release, a validation has been added which first checks to see if the host is in maintenance mode. The Manager will only call getDeviceList if the host is up. (BZ#1468999)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Manager.",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.\n\nThe Manager is a JBoss Application Server application that provides several interfaces for accessing and interacting with the virtual environment, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).\n\nChanges to the ovirt-engine component:\n\n* Previously, users could use the REST API to add/edit affinity labels for virtual machines and hosts, but they could not view this information in the Administration Portal.\n\nIn this release, affinity label information is now available in the Administration Portal. It can be seen in the Add/Edit windows for virtual machines and hosts. The window displays all available affinity labels in the system, and for entities with assigned labels, those labels are selected. (BZ#1465862)\n\n* Previously, when creating a new VLAN-tagged network, the Manager did not allow the same VLAN ID to be duplicated across various entities, such as networks and data centers.\n\nIn this release, it is now possible to use the same VLAN ID across multiple entities, as long as they are not used on the same interface on the hardware node. (BZ#1467058)\n\n* Previously, if a host is in maintenance mode and a user calls GET /ovirt-engine/api/hosts/64fc087f-821b-429a-b274-5e8597a88f3d/storage through the REST API, the Manager would try to call getDeviceList on the host, and as a result it would be fenced.\nIn this release, a validation has been added which first checks to see if the host is in maintenance mode. The Manager will only call getDeviceList if the host is up. (BZ#1468999)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2017:1814",
"url": "https://access.redhat.com/errata/RHEA-2017:1814"
},
{
"category": "external",
"summary": "1418683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418683"
},
{
"category": "external",
"summary": "1463698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463698"
},
{
"category": "external",
"summary": "1465862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465862"
},
{
"category": "external",
"summary": "1467058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1467058"
},
{
"category": "external",
"summary": "1468968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468968"
},
{
"category": "external",
"summary": "1468999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468999"
},
{
"category": "external",
"summary": "1470802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhea-2017_1814.json"
}
],
"title": "Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.4",
"tracking": {
"current_release_date": "2024-11-14T23:32:32+00:00",
"generator": {
"date": "2024-11-14T23:32:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHEA-2017:1814",
"initial_release_date": "2017-07-27T00:00:00+00:00",
"revision_history": [
{
"date": "2017-07-27T00:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-07-27T17:59:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:32:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization Manager 4.1",
"product": {
"name": "Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl-javadoc@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-lib@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-userportal@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"product_id": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.1.4.2-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_id": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.4.2-0.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"product": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"product_id": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.4.2-0.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.4.2-0.1.el7.src as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src"
},
"product_reference": "ovirt-engine-0:4.1.4.2-0.1.el7.src",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:4.1.4.2-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
},
"product_reference": "rhevm-0:4.1.4.2-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7510",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1456590"
}
],
"notes": [
{
"category": "description",
"text": "It is reported that the RHV 4 REST API exposes data used in cloud-init which can include the root password used when creating a system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "4: ovirt-engine exposes cloud-init root password via REST API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7510"
},
{
"category": "external",
"summary": "RHBZ#1456590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1456590"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7510",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7510"
}
],
"release_date": "2017-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-07-27T00:00:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2017:1814"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.4.2-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.4.2-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.4.2-0.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "4: ovirt-engine exposes cloud-init root password via REST API"
}
]
}
GSD-2017-7510
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-7510",
"description": "In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.",
"id": "GSD-2017-7510",
"references": [
"https://access.redhat.com/errata/RHEA-2017:1814"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-7510"
],
"details": "In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.",
"id": "GSD-2017-7510",
"modified": "2023-12-13T01:21:06.543834Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7510",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RHV",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.1"
}
]
}
}
]
},
"vendor_name": "[UNKNOWN]"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-200",
"lang": "eng",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:ovirt-engine:4.1.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7510"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-02-12T23:30Z",
"publishedDate": "2019-03-25T18:29Z"
}
}
}
GHSA-4MQP-W6V5-GR6X
Vulnerability from github – Published: 2022-05-13 01:28 – Updated: 2022-05-13 01:28
VLAI?
Details
In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.
Severity ?
8.8 (High)
{
"affected": [],
"aliases": [
"CVE-2017-7510"
],
"database_specific": {
"cwe_ids": [
"CWE-200",
"CWE-522"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-03-25T18:29:00Z",
"severity": "HIGH"
},
"details": "In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.",
"id": "GHSA-4mqp-w6v5-gr6x",
"modified": "2022-05-13T01:28:18Z",
"published": "2022-05-13T01:28:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7510"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHEA-2017:1814"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2017-7510"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1456590"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2017-7510
Vulnerability from fkie_nvd - Published: 2019-03-25 18:29 - Updated: 2024-11-21 03:32
Severity ?
Summary
In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510 | Issue Tracking, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | ovirt-engine | 4.1.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ovirt-engine:4.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "FD99FCF5-F433-4DED-98D5-954FB8E05DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface."
},
{
"lang": "es",
"value": "En ovirt-engine 4.1, si un host fuera aprovisionado con un cloud-init, la contrase\u00f1a root podr\u00eda ser revelada a trav\u00e9s de la interfaz REST."
}
],
"id": "CVE-2017-7510",
"lastModified": "2024-11-21T03:32:02.760",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-03-25T18:29:00.387",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-522"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…