CVE-2017-8001

An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Nov/35 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/101997 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:dell:emc_scaleio:2.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_scaleio:2.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_scaleio:2.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_scaleio:2.0.1.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-11-28 07:29

Updated : 2024-02-04 19:29


NVD link : CVE-2017-8001

Mitre link : CVE-2017-8001

CVE.ORG link : CVE-2017-8001


JSON object : View

Products Affected

dell

  • emc_scaleio

linux

  • linux_kernel
CWE
CWE-532

Insertion of Sensitive Information into Log File