CVE Vulnerabilities

CVE-2017-8001

Insertion of Sensitive Information into Log File

Published: Nov 28, 2017 | Modified: Nov 14, 2019
CVSS 3.x
8.4
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.

Weakness

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Affected Software

Name Vendor Start Version End Version
Emc_scaleio Dell 2.0.1.0 (including) 2.0.1.0 (including)
Emc_scaleio Dell 2.0.1.1 (including) 2.0.1.1 (including)
Emc_scaleio Dell 2.0.1.2 (including) 2.0.1.2 (including)
Emc_scaleio Dell 2.0.1.3 (including) 2.0.1.3 (including)

Extended Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for:

Potential Mitigations

References