CVE Vulnerabilities

CVE-2019-3500

Insertion of Sensitive Information into Log File

Published: Jan 02, 2019 | Modified: Nov 07, 2023
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

aria2c in aria2 1.33.1, when –log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file.

Weakness

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Affected Software

Name Vendor Start Version End Version
Aria2 Aria2_project 1.33.1 (including) 1.33.1 (including)
Aria2 Ubuntu bionic *
Aria2 Ubuntu cosmic *
Aria2 Ubuntu disco *
Aria2 Ubuntu esm-apps/bionic *
Aria2 Ubuntu esm-apps/xenial *
Aria2 Ubuntu trusty *
Aria2 Ubuntu trusty/esm *
Aria2 Ubuntu upstream *
Aria2 Ubuntu xenial *

Extended Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for:

Potential Mitigations

References