RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.
References
Link | Resource |
---|---|
https://seclists.org/fulldisclosure/2019/Mar/19 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/107406 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-03-13 14:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-3716
Mitre link : CVE-2019-3716
JSON object : View
CWE
CWE-532
Insertion of Sensitive Information into Log File
Products Affected
rsa
- archer_grc_platform