Show plain JSON{"id": "CVE-2019-10195", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Secondary", "source": "secalert@redhat.com", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.7, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.1}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2019-11-27T08:15:10.617", "references": [{"url": "https://access.redhat.com/errata/RHBA-2019:4268", "source": "secalert@redhat.com"}, {"url": "https://access.redhat.com/errata/RHSA-2020:0378", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "secalert@redhat.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/", "source": "secalert@redhat.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/", "source": "secalert@redhat.com"}, {"url": "https://www.freeipa.org/page/Releases/4.6.7", "tags": ["Release Notes"], "source": "secalert@redhat.com"}, {"url": "https://www.freeipa.org/page/Releases/4.7.4", "tags": ["Release Notes"], "source": "secalert@redhat.com"}, {"url": "https://www.freeipa.org/page/Releases/4.8.3", "tags": ["Release Notes"], "source": "secalert@redhat.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-532"}]}, {"type": "Secondary", "source": "secalert@redhat.com", "description": [{"lang": "en", "value": "CWE-200"}, {"lang": "en", "value": "CWE-532"}]}], "descriptions": [{"lang": "en", "value": "A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed."}, {"lang": "es", "value": "Se encontr\u00f3 un fallo en IPA, todas las versiones 4.6.x anteriores a la versi\u00f3n 4.6.7, todas las versiones 4.7.x anteriores a la 4.7.4 y todas las versiones 4.8.x anteriores a 4.8.3, en la manera en que la API de procesamiento por lotes de FreeIPA registr\u00f3 operaciones. Esto inclu\u00eda pasar contrase\u00f1as de usuario en texto sin cifrar en los maestros de FreeIPA. El procesamiento por lotes de comandos con contrase\u00f1as como argumentos u opciones no se realiza por defecto en FreeIPA, pero es posible mediante componentes de terceros. Un atacante que tenga acceso a los registros del sistema en los maestros de FreeIPA podr\u00eda usar este fallo para producir el contenido del archivo de registro con las contrase\u00f1as expuestas."}], "lastModified": "2023-11-07T03:02:26.247", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29666089-A4A8-4DD4-83C8-357E001427ED", "versionEndExcluding": "4.6.7", "versionStartIncluding": "4.6.0"}, {"criteria": "cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "625B0AD7-DCC0-4F0D-BC06-5761EA638F81", "versionEndExcluding": "4.7.4", "versionStartIncluding": "4.7.0"}, {"criteria": "cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F42E63C2-E57F-48E8-8427-8897381AFE2F", "versionEndExcluding": "4.8.3", "versionStartIncluding": "4.8.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3"}, {"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}