Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
References
Link | Resource |
---|---|
https://blog.replicated.com | Vendor Advisory |
https://gradle.com/enterprise/releases/2019.5/#changes | Third Party Advisory |
https://www.replicated.com/security/advisories/CVE-2020-10590 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Aug 2021, 13:49
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://gradle.com/enterprise/releases/2019.5/#changes - Third Party Advisory | |
References | (MISC) https://blog.replicated.com - Vendor Advisory | |
References | (MISC) https://www.replicated.com/security/advisories/CVE-2020-10590 - Vendor Advisory | |
CWE | CWE-200 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:* cpe:2.3:a:replicated:replicated_classic:2.41.0:*:*:*:*:*:*:* |
30 Jul 2021, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-30 14:15
Updated : 2024-02-04 21:47
NVD link : CVE-2020-10590
Mitre link : CVE-2020-10590
CVE.ORG link : CVE-2020-10590
JSON object : View
Products Affected
replicated
- replicated_classic
CWE