CVE Vulnerabilities

CVE-2019-10224

Insufficiently Protected Credentials

Published: Nov 25, 2019 | Modified: Nov 21, 2024
CVSS 3.x
4.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
4.3 LOW
CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

NameVendorStart VersionEnd Version
389_directory_serverFedoraproject1.4.0.0 (including)1.4.1.3 (excluding)
Red Hat Enterprise Linux 8RedHat389-ds:1.4-8010020190903200205.eb48df33*
389-ds-baseUbuntubionic*
389-ds-baseUbuntudisco*
389-ds-baseUbuntuesm-apps/bionic*
389-ds-baseUbuntuesm-apps/xenial*
389-ds-baseUbuntutrusty*
389-ds-baseUbuntuupstream*
389-ds-baseUbuntuxenial*
Python-lib389Ubuntutrusty*

Potential Mitigations

References