CVE-2016-2142Sensitive Information Exposure in Redhat Openshift

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 87.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 8
Latest updateMay 17

Description

Red Hat OpenShift Enterprise 3.1 uses world-readable permissions on the /etc/origin/master/master-config.yaml configuration file, which allows local users to obtain Active Directory credentials by reading the file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-8qr6-wfrg-m44g: Red Hat OpenShift Enterprise 32022-05-17
CVEList
CVE-2016-2142: Red Hat OpenShift Enterprise 32016-06-08

📋Vendor Advisories

1
Red Hat
openshift: Bind password for AD account is stored in world readable file2016-02-17

💬Community

1
Bugzilla
CVE-2016-2142 openshift: Bind password for AD account is stored in world readable file2016-02-23
CVE-2016-2142 — Sensitive Information Exposure | cvebase