Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown

CVE-2014-0161

Disclosure Date: January 02, 2020 (last updated February 21, 2025)
ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate.
Attacker Value
Unknown

CVE-2015-1780

Disclosure Date: November 22, 2019 (last updated November 27, 2024)
oVirt users with MANIPULATE_STORAGE_DOMAIN permissions can attach a storage domain to any data-center
Attacker Value
Unknown

CVE-2013-4367

Disclosure Date: November 01, 2019 (last updated November 27, 2024)
ovirt-engine 3.2 running on Linux kernel 3.1 and newer creates certain files world-writeable due to an upstream kernel change which impacted how python's os.chmod() works when passed a mode of '-1'.
Attacker Value
Unknown

CVE-2019-10194

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts.
Attacker Value
Unknown

CVE-2019-10139

Disclosure Date: May 17, 2019 (last updated November 27, 2024)
During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted.
Attacker Value
Unknown

CVE-2019-3879

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
It was discovered that in the ovirt's REST API before version 4.3.2.1, RemoveDiskCommand is triggered as an internal command, meaning the permission validation that should be performed against the calling user is skipped. A user with low privileges (eg Basic Operations) could exploit this flaw to delete disks attached to guests.
Attacker Value
Unknown

CVE-2017-7510

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.
Attacker Value
Unknown

CVE-2017-15113

Disclosure Date: July 27, 2018 (last updated November 08, 2023)
ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
0
Attacker Value
Unknown

CVE-2018-1072

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords.
0
Attacker Value
Unknown

CVE-2018-1117

Disclosure Date: June 20, 2018 (last updated November 26, 2024)
ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log. In an environment where logs are shared with other parties, this could lead to privilege escalation.
0