RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.
The product writes sensitive information to a log file.
Link | Tags |
---|---|
https://seclists.org/fulldisclosure/2019/Mar/19 | third party advisory mailing list |
http://www.securityfocus.com/bid/107406 | third party advisory vdb entry |