A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212 | Issue Tracking Mitigation Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:2998 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2020:0727 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220210-0017/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2019-10-02 12:15
Updated : 2022-02-19 22:20
NVD link : CVE-2019-10212
Mitre link : CVE-2019-10212
JSON object : View
CWE
CWE-532
Insertion of Sensitive Information into Log File
Products Affected
redhat
- undertow
- jboss_data_grid
- enterprise_linux
- jboss_enterprise_application_platform
- single_sign-on
- openshift_application_runtimes
- jboss_fuse
netapp
- active_iq_unified_manager