Vulnerability Details : CVE-2022-1662
In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list while convert2rhel is running. However, this ansible playbook is only an example in the upstream repository and it is not shipped in officially supported versions of convert2rhel.
Vulnerability category: Information leak
Products affected by CVE-2022-1662
- cpe:2.3:a:convert2rhel_project:convert2rhel:0.24:*:*:*:*:*:*:*
- cpe:2.3:a:convert2rhel_project:convert2rhel:0.25:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-1662
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-1662
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2022-1662
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2022-1662
-
https://bugzilla.redhat.com/show_bug.cgi?id=2083851
2083851 – (CVE-2022-1662) CVE-2022-1662 convert2rhel: ansible playbook passes credentials to convert2rhel via CLIIssue Tracking;Patch;Third Party Advisory
Jump to