2024-03-21 05:03:53 +00:00

109 lines
3.9 KiB
JSON

{
"id": "CVE-2022-29550",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-18T13:15:07.957",
"lastModified": "2024-03-21T02:42:44.077",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Qualys Cloud Agent 4.8.0-49. It writes \"ps auxwwe\" output to the /var/log/qualys/qualys-cloud-agent-scan.log file. This may, for example, unexpectedly write credentials (from environment variables) to disk in cleartext. NOTE: there are no common circumstances in which qualys-cloud-agent-scan.log can be read by a user other than root; however, the file contents could be exposed through site-specific operational practices. The vendor does NOT characterize this as a vulnerability because the ps data collection is intentional, and would only capture credentials on a machine that was already affected by the CWE-214 weakness"
},
{
"lang": "es",
"value": "** EN DISPUTA ** Se ha detectado un problema en Qualys Cloud Agent versi\u00f3n 4.8.0-49. Escribe la salida \"ps auxwwe\" en el archivo /var/log/qualys/qualys-cloud-agent-scan.log. Esto puede, por ejemplo, escribir inesperadamente las credenciales (de las variables de entorno) en el disco en texto sin cifrar. NOTA: no se presentan circunstancias comunes en las que qualys-cloud-agent-scan.log pueda ser le\u00eddo por un usuario que no sea root; sin embargo, el contenido del archivo podr\u00eda estar expuesto mediante pr\u00e1cticas operativas espec\u00edficas del sitio. El proveedor NO caracteriza esto como una vulnerabilidad porque la recolecci\u00f3n de datos ps es intencional, y s\u00f3lo capturar\u00eda credenciales en una m\u00e1quina que ya estuviera afectada por la debilidad CWE-214."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualys:cloud_agent:4.8.0-49:*:*:*:*:linux:*:*",
"matchCriteriaId": "EE1CD51C-0C69-4381-8834-DC7D9C1FB0A4"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/Sep/10",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://blog.qualys.com/vulnerabilities-threat-research",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}