Redhat

Storage Console

3 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.69%
  • Published 19.07.2018 13:29:00
  • Last modified 21.11.2024 03:31:59

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting ...

  • EPSS 0.04%
  • Published 06.07.2018 13:29:00
  • Last modified 21.11.2024 03:23:56

The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyri...

  • EPSS 0.07%
  • Published 27.06.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

rhscon-ceph in Red Hat Storage Console 2 x86_64 and Red Hat Storage Console Node 2 x86_64 allows local users to obtain the password as cleartext.