mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
96 lines
3.1 KiB
JSON
96 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2022-1662",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2022-07-14T15:15:07.983",
|
|
"lastModified": "2022-07-20T13:21:49.193",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list while convert2rhel is running. However, this ansible playbook is only an example in the upstream repository and it is not shipped in officially supported versions of convert2rhel."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En convert2rhel, se presenta un ansible playbook llamado ansible/run-convert2rhel.yml que pasa la contrase\u00f1a del usuario de Red Hat Subscription Manager por medio de la CLI a convert2rhel. Esto podr\u00eda permitir a usuarios locales no autorizados visualizar la contrase\u00f1a por medio de la lista de procesos mientras convert2rhel esta siendo ejecutando. Sin embargo, este ansible playbook es s\u00f3lo un ejemplo en el repositorio upstream y no est\u00e1 incluido en las versiones oficialmente soportadas de convert2rhel"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "secalert@redhat.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:convert2rhel_project:convert2rhel:0.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0B763E8-3BD7-4453-8495-4241E8A695E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:convert2rhel_project:convert2rhel:0.25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BCB3F7C-DBA6-45EF-A9A4-A5C379E1ED7C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083851",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |