Redhat Storage Console vulnerabilities
3 known vulnerabilities affecting redhat/storage_console.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
1
Severity breakdown
CRITICAL1HIGH2
Vulnerabilities
Page 1 of 1
CVE-2017-7481CRITICALCVSS 9.8Exploitedv2.02018-07-19
CVE-2017-7481 [CRITICAL] CWE-20 CVE-2017-7481: Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe.
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not eval
nvd
CVE-2017-2665HIGHCVSS 7.0v2.02018-07-06
CVE-2017-2665 [MEDIUM] CWE-522 CVE-2017-2665: The skyring-setup command creates random password for mongodb skyring database but it writes passwor
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
nvd
CVE-2016-7062HIGHCVSS 7.8v2.02017-06-27
CVE-2016-7062 [HIGH] CWE-255 CVE-2016-7062: rhscon-ceph in Red Hat Storage Console 2 x86_64 and Red Hat Storage Console Node 2 x86_64 allows loc
rhscon-ceph in Red Hat Storage Console 2 x86_64 and Red Hat Storage Console Node 2 x86_64 allows local users to obtain the password as cleartext.
nvd