The trove service user in (1) Openstack deployment (aka crowbar-openstack) and (2) Trove Barclamp (aka barclamp-trove and crowbar-barclamp-trove) in the Crowbar Framework has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors.
References
Link | Resource |
---|---|
https://github.com/crowbar/barclamp-trove/commit/932298f250365fed6963700870e52db3a7a32daa | Issue Tracking Patch |
https://www.suse.com/security/cve//CVE-2016-6829.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/92476 | Third Party Advisory VDB Entry |
https://github.com/crowbar/crowbar-openstack/commit/208230bdfbcb19d062149d083b1a66b429516a69 | Issue Tracking Patch |
http://www.openwall.com/lists/oss-security/2016/08/18/9 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/08/16/1 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-12-09 12:59
Updated : 2020-09-09 08:13
NVD link : CVE-2016-6829
Mitre link : CVE-2016-6829
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
barclamp-trove_project
- barclamp-trove
crowbar-openstack_project
- crowbar-openstack