Severity
4.6MEDIUMNVD
EPSS
0.1%
top 83.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 25
Latest updateMay 24

Description

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 0.9 | Impact: 3.6

Affected Packages3 packages

NVDfedoraproject/389_directory_server1.4.0.01.4.1.3
Debianport389/389-ds-base< 1.4.1.5-1+2
CVEListV5red_hat/389-ds-base389-ds-base 1.4.x.x before 1.4.1.3

🔴Vulnerability Details

3
GHSA
GHSA-349x-pch6-942w: A flaw has been found in 389-ds-base versions 12022-05-24
OSV
CVE-2019-10224: A flaw has been found in 389-ds-base versions 12019-11-25
CVEList
CVE-2019-10224: A flaw has been found in 389-ds-base versions 12019-11-25

📋Vendor Advisories

2
Debian
CVE-2019-10224: 389-ds-base - A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When execu...2019
Red Hat
389-ds-base: using dscreate in verbose mode results in information disclosure2018-11-27

💬Community

3
Bugzilla
CVE-2019-10158 infinispan: Session fixation protection broken for Spring Session integration2019-05-27
Bugzilla
CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure2019-02-14
Bugzilla
CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure [rhel-8]2018-11-27
CVE-2019-10224 — Insufficiently Protected Credentials | cvebase