ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2019-53 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IN3FP6VXYSD4OMUCFZNOL7MKPWRQFAL/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4IAS4HI24H2ERKBZTDEVJ3LEQEFWYSCT/ | Mailing List Third Party Advisory |
Information
Published : 2019-12-17 14:15
Updated : 2020-10-15 12:36
NVD link : CVE-2019-3992
Mitre link : CVE-2019-3992
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
elog_project
- elog
fedoraproject
- fedora