CVE-2022-1662Sensitive Information Exposure in Project Convert2rhel

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 86.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 14
Latest updateFeb 23

Description

In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list while convert2rhel is running. However, this ansible playbook is only an example in the upstream repository and it is not shipped in officially supported versions of convert2rhel.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5convert2rhel_project/convert2rhelconvert2rhel 0.26 Vivi

Patches

🔴Vulnerability Details

2
GHSA
GHSA-77gc-239h-cc4p: In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel2022-07-15
CVEList
CVE-2022-1662: In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel2022-07-14

📋Vendor Advisories

1
Red Hat
convert2rhel: ansible playbook passes credentials to convert2rhel via CLI2022-05-10

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: EIP Stack Group OpENer open to two remote code execution vulnerabilities2023-02-23
Talos
Vulnerability Spotlight: EIP Stack Group OpENer open to two remote code execution vulnerabilities2023-02-23
CVE-2022-1662 — Sensitive Information Exposure | cvebase