CVE-2020-10590

Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:2.41.0:*:*:*:*:*:*:*

History

06 Aug 2021, 13:49

Type Values Removed Values Added
References (CONFIRM) https://gradle.com/enterprise/releases/2019.5/#changes - (CONFIRM) https://gradle.com/enterprise/releases/2019.5/#changes - Third Party Advisory
References (MISC) https://blog.replicated.com - (MISC) https://blog.replicated.com - Vendor Advisory
References (MISC) https://www.replicated.com/security/advisories/CVE-2020-10590 - (MISC) https://www.replicated.com/security/advisories/CVE-2020-10590 - Vendor Advisory
CWE CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:replicated:replicated_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:replicated:replicated_classic:2.41.0:*:*:*:*:*:*:*

30 Jul 2021, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-30 14:15

Updated : 2024-02-04 21:47


NVD link : CVE-2020-10590

Mitre link : CVE-2020-10590

CVE.ORG link : CVE-2020-10590


JSON object : View

Products Affected

replicated

  • replicated_classic