An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
The product makes files or directories accessible to unauthorized actors, even though they should not be.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:3481 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1510149 | issue tracking third party advisory |
https://access.redhat.com/security/cve/CVE-2017-15104 | third party advisory |
https://github.com/heketi/heketi/releases/tag/v5.0.1 | release notes |