Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
References
Link | Resource |
---|---|
https://gradle.com/enterprise/releases/2019.5/#changes | Third Party Advisory |
https://www.replicated.com/security/advisories/CVE-2020-10590 | Vendor Advisory |
https://blog.replicated.com | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-07-30 07:15
Updated : 2021-08-06 06:49
NVD link : CVE-2020-10590
Mitre link : CVE-2020-10590
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
replicated
- replicated_classic