ID CVE-2012-5658
Summary rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:openshift:1.0:-:enterprise:*:*:*:*:*
    cpe:2.3:a:redhat:openshift:1.0:-:enterprise:*:*:*:*:*
  • cpe:2.3:a:redhat:openshift_origin:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openshift_origin:1.0.5:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 26-02-2013 - 05:00)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
redhat via4
advisories
rhsa
id RHSA-2013:0220
rpms
  • jenkins-0:1.498-1.1.el6op
  • libmongodb-0:2.0.2-6.el6op
  • mongodb-0:2.0.2-6.el6op
  • mongodb-debuginfo-0:2.0.2-6.el6op
  • mongodb-devel-0:2.0.2-6.el6op
  • mongodb-server-0:2.0.2-6.el6op
  • openshift-console-0:0.0.13-2.el6op
  • openshift-origin-broker-0:1.0.10-1.el6op
  • openshift-origin-broker-util-0:1.0.14-1.el6op
  • openshift-origin-cartridge-haproxy-1.4-0:1.0.3-1.el6op
  • openshift-origin-cartridge-ruby-1.8-0:1.0.5-1.el6op
  • openshift-origin-cartridge-ruby-1.9-scl-0:1.0.5-1.el6op
  • openshift-origin-msg-node-mcollective-0:1.0.2-1.el6op
  • openshift-origin-node-util-0:1.0.7-1.el6op
  • openshift-origin-port-proxy-0:1.0.3-1.el6op
  • rhc-0:1.3.2-1.3.el6op
  • ruby193-mod_passenger-0:3.0.12-21.el6op
  • ruby193-rubygem-activerecord-1:3.2.8-2.el6
  • ruby193-rubygem-activerecord-doc-1:3.2.8-2.el6
  • ruby193-rubygem-passenger-0:3.0.12-21.el6op
  • ruby193-rubygem-passenger-debuginfo-0:3.0.12-21.el6op
  • ruby193-rubygem-passenger-devel-0:3.0.12-21.el6op
  • ruby193-rubygem-passenger-doc-0:3.0.12-21.el6op
  • ruby193-rubygem-passenger-native-0:3.0.12-21.el6op
  • ruby193-rubygem-passenger-native-libs-0:3.0.12-21.el6op
  • rubygem-activerecord-1:3.0.13-3.el6op
  • rubygem-openshift-origin-auth-remote-user-0:1.0.4-2.el6op
  • rubygem-openshift-origin-common-0:1.0.2-1.el6op
  • rubygem-openshift-origin-console-0:1.0.6-1.el6op
  • rubygem-openshift-origin-console-doc-0:1.0.6-1.el6op
  • rubygem-openshift-origin-controller-0:1.0.11-1.el6op
  • rubygem-openshift-origin-dns-bind-0:1.0.2-1.el6op
  • rubygem-openshift-origin-msg-broker-mcollective-0:1.0.4-1.el6op
  • rubygem-openshift-origin-node-0:1.0.10-6.el6op
refmap via4
misc https://bugzilla.redhat.com/show_bug.cgi?id=889062
Last major update 26-02-2013 - 05:00
Published 24-02-2013 - 22:55
Last modified 26-02-2013 - 05:00
Back to Top