Vulnerability Details CVE-2021-3130
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.3%
CVSS Severity
CVSS v3 Score 5.9
CVSS v2 Score 4.3
Products affected by CVE-2021-3130
-
cpe:2.3:a:opmantek:open-audit:1.0.3
-
cpe:2.3:a:opmantek:open-audit:1.0.4
-
cpe:2.3:a:opmantek:open-audit:1.0.5
-
cpe:2.3:a:opmantek:open-audit:1.0.6
-
cpe:2.3:a:opmantek:open-audit:1.1
-
cpe:2.3:a:opmantek:open-audit:1.10
-
cpe:2.3:a:opmantek:open-audit:1.12
-
cpe:2.3:a:opmantek:open-audit:1.12.10
-
cpe:2.3:a:opmantek:open-audit:1.12.2
-
cpe:2.3:a:opmantek:open-audit:1.12.2-1
-
cpe:2.3:a:opmantek:open-audit:1.12.4
-
cpe:2.3:a:opmantek:open-audit:1.12.6
-
cpe:2.3:a:opmantek:open-audit:1.12.8
-
cpe:2.3:a:opmantek:open-audit:1.12.8.1
-
cpe:2.3:a:opmantek:open-audit:1.12.8.2
-
cpe:2.3:a:opmantek:open-audit:1.14.2
-
cpe:2.3:a:opmantek:open-audit:1.2
-
cpe:2.3:a:opmantek:open-audit:1.2.1
-
cpe:2.3:a:opmantek:open-audit:1.3
-
cpe:2.3:a:opmantek:open-audit:1.3.1
-
cpe:2.3:a:opmantek:open-audit:1.3.2
-
cpe:2.3:a:opmantek:open-audit:1.4
-
cpe:2.3:a:opmantek:open-audit:1.5.1
-
cpe:2.3:a:opmantek:open-audit:1.5.2
-
cpe:2.3:a:opmantek:open-audit:1.5.3
-
cpe:2.3:a:opmantek:open-audit:1.6
-
cpe:2.3:a:opmantek:open-audit:1.6.2
-
cpe:2.3:a:opmantek:open-audit:1.6.4
-
cpe:2.3:a:opmantek:open-audit:1.8
-
cpe:2.3:a:opmantek:open-audit:1.8.2
-
cpe:2.3:a:opmantek:open-audit:1.8.4
-
cpe:2.3:a:opmantek:open-audit:2.0.1
-
cpe:2.3:a:opmantek:open-audit:2.0.1-1
-
cpe:2.3:a:opmantek:open-audit:2.0.1-2
-
cpe:2.3:a:opmantek:open-audit:2.0.10
-
cpe:2.3:a:opmantek:open-audit:2.0.11
-
cpe:2.3:a:opmantek:open-audit:2.0.2
-
cpe:2.3:a:opmantek:open-audit:2.0.2-1
-
cpe:2.3:a:opmantek:open-audit:2.0.4
-
cpe:2.3:a:opmantek:open-audit:2.0.6
-
cpe:2.3:a:opmantek:open-audit:2.0.8
-
cpe:2.3:a:opmantek:open-audit:2.1
-
cpe:2.3:a:opmantek:open-audit:2.1.0
-
cpe:2.3:a:opmantek:open-audit:2.1.1
-
cpe:2.3:a:opmantek:open-audit:2.2.0
-
cpe:2.3:a:opmantek:open-audit:2.2.1
-
cpe:2.3:a:opmantek:open-audit:2.2.2
-
cpe:2.3:a:opmantek:open-audit:2.2.3
-
cpe:2.3:a:opmantek:open-audit:2.2.4
-
cpe:2.3:a:opmantek:open-audit:2.2.5
-
cpe:2.3:a:opmantek:open-audit:2.2.6
-
cpe:2.3:a:opmantek:open-audit:2.2.7
-
cpe:2.3:a:opmantek:open-audit:2.3.0
-
cpe:2.3:a:opmantek:open-audit:2.3.1
-
cpe:2.3:a:opmantek:open-audit:2.3.2
-
cpe:2.3:a:opmantek:open-audit:2.3.3
-
cpe:2.3:a:opmantek:open-audit:3.0.0
-
cpe:2.3:a:opmantek:open-audit:3.0.1
-
cpe:2.3:a:opmantek:open-audit:3.0.2
-
cpe:2.3:a:opmantek:open-audit:3.1.0
-
cpe:2.3:a:opmantek:open-audit:3.1.1
-
cpe:2.3:a:opmantek:open-audit:3.1.2
-
cpe:2.3:a:opmantek:open-audit:3.2.0
-
cpe:2.3:a:opmantek:open-audit:3.2.1
-
cpe:2.3:a:opmantek:open-audit:3.2.2
-
cpe:2.3:a:opmantek:open-audit:3.3.0
-
cpe:2.3:a:opmantek:open-audit:3.3.1
-
cpe:2.3:a:opmantek:open-audit:3.3.2
-
cpe:2.3:a:opmantek:open-audit:3.4.0
-
cpe:2.3:a:opmantek:open-audit:3.5.0
-
cpe:2.3:a:opmantek:open-audit:3.5.1
-
cpe:2.3:a:opmantek:open-audit:3.5.2
-
cpe:2.3:a:opmantek:open-audit:3.5.3
-
cpe:2.3:a:opmantek:open-audit:4.0.1
-
cpe:2.3:a:opmantek:open-audit:4.0.2