Vulnerability Details : CVE-2012-0059
Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email.
Products affected by CVE-2012-0059
- cpe:2.3:a:redhat:network_proxy:5.4:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:satellite:5.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-0059
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-0059
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-0059
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0059
-
http://rhn.redhat.com/errata/RHSA-2012-0102.html
RHSA-2012:0102 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2012-0101.html
RHSA-2012:0101 - Security Advisory - Red Hat Customer PortalVendor Advisory
Jump to