CVE-2017-15104

An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:heketi_project:heketi:5.0.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

12 Feb 2023, 23:28

Type Values Removed Values Added
CWE CWE-200 CWE-552
Summary An access flaw was found in heketi, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file. An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.

02 Feb 2023, 15:17

Type Values Removed Values Added
Summary An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file. An access flaw was found in heketi, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.

Information

Published : 2017-12-18 19:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-15104

Mitre link : CVE-2017-15104

CVE.ORG link : CVE-2017-15104


JSON object : View

Products Affected

heketi_project

  • heketi

redhat

  • enterprise_linux
CWE
CWE-552

Files or Directories Accessible to External Parties

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor