CVE-2019-10195
MEDIUM
5,7
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
MEDIUM
4,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0088
Percentile
0,7th
Updated
EPSS Score Trend (Last 90 Days)
200
Exposure of Sensitive Information to an Unauthorized Actor
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies:
Mobile, Not Technology-Specific, Web Based
532
Insertion of Sensitive Information into Log File
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
All platforms may be affected
Application
Freeipa by Freeipa
Version Range Affected
From
4.6.0
(inclusive)
To
4.6.7
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Freeipa by Freeipa
Version Range Affected
From
4.7.0
(inclusive)
To
4.7.4
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Fedora by Fedoraproject
CPE Identifier
View Detailed Analysis
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Fedora by Fedoraproject
CPE Identifier
View Detailed Analysis
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Freeipa by Freeipa
Version Range Affected
From
4.8.0
(inclusive)
To
4.8.3
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://access.redhat.com/errata/RHBA-2019:4268
https://access.redhat.com/errata/RHSA-2020:0378
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://www.freeipa.org/page/Releases/4.6.7
https://www.freeipa.org/page/Releases/4.7.4
https://www.freeipa.org/page/Releases/4.8.3
https://access.redhat.com/errata/RHBA-2019:4268
https://access.redhat.com/errata/RHSA-2020:0378
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://www.freeipa.org/page/Releases/4.6.7
https://www.freeipa.org/page/Releases/4.7.4
https://www.freeipa.org/page/Releases/4.8.3