Vulnerabilities
Vulnerable Software
Redhat:  >> Storage Console  >> 2.0  Security Vulnerabilities
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
CVSS Score
5.3
EPSS Score
0.037
Published
2018-07-19
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
CVSS Score
4.8
EPSS Score
0.0
Published
2018-07-06
rhscon-ceph in Red Hat Storage Console 2 x86_64 and Red Hat Storage Console Node 2 x86_64 allows local users to obtain the password as cleartext.
CVSS Score
7.8
EPSS Score
0.001
Published
2017-06-27


Contact Us

Shodan ® - All rights reserved