PYSEC-2019-22
Vulnerability from pysec - Published: 2019-11-27 08:15 - Updated: 2020-02-05 00:15
VLAI?
Details
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
Impacted products
| Name | purl | freeipa | pkg:pypi/freeipa |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "freeipa",
"purl": "pkg:pypi/freeipa"
},
"ranges": [
{
"events": [
{
"introduced": "4.6.1"
},
{
"fixed": "4.6.7"
},
{
"introduced": "4.7.0"
},
{
"fixed": "4.7.4"
},
{
"introduced": "4.8.0"
},
{
"fixed": "4.8.3"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.6.1",
"4.6.2",
"4.6.3",
"4.6.4",
"4.6.5",
"4.7.0",
"4.7.1",
"4.7.2",
"4.8.0",
"4.8.1",
"4.8.2"
]
}
],
"aliases": [
"CVE-2019-10195"
],
"details": "A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA\u0027s batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.",
"id": "PYSEC-2019-22",
"modified": "2020-02-05T00:15:00Z",
"published": "2019-11-27T08:15:00Z",
"references": [
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195"
},
{
"type": "WEB",
"url": "https://www.freeipa.org/page/Releases/4.8.3"
},
{
"type": "WEB",
"url": "https://www.freeipa.org/page/Releases/4.6.7"
},
{
"type": "WEB",
"url": "https://www.freeipa.org/page/Releases/4.7.4"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2020:0378"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHBA-2019:4268"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…