Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown
CVE-2014-0161
Disclosure Date: January 02, 2020 (last updated February 21, 2025)
ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate.
0
Attacker Value
Unknown
CVE-2015-1780
Disclosure Date: November 22, 2019 (last updated November 27, 2024)
oVirt users with MANIPULATE_STORAGE_DOMAIN permissions can attach a storage domain to any data-center
0
Attacker Value
Unknown
CVE-2013-4367
Disclosure Date: November 01, 2019 (last updated November 27, 2024)
ovirt-engine 3.2 running on Linux kernel 3.1 and newer creates certain files world-writeable due to an upstream kernel change which impacted how python's os.chmod() works when passed a mode of '-1'.
0
Attacker Value
Unknown
CVE-2019-10194
Disclosure Date: July 11, 2019 (last updated November 27, 2024)
Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts.
0
Attacker Value
Unknown
CVE-2019-10139
Disclosure Date: May 17, 2019 (last updated November 27, 2024)
During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted.
0
Attacker Value
Unknown
CVE-2019-3879
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
It was discovered that in the ovirt's REST API before version 4.3.2.1, RemoveDiskCommand is triggered as an internal command, meaning the permission validation that should be performed against the calling user is skipped. A user with low privileges (eg Basic Operations) could exploit this flaw to delete disks attached to guests.
0
Attacker Value
Unknown
CVE-2017-7510
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface.
0
Attacker Value
Unknown
CVE-2017-15113
Disclosure Date: July 27, 2018 (last updated November 08, 2023)
ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
0
Attacker Value
Unknown
CVE-2018-1072
Disclosure Date: June 26, 2018 (last updated November 26, 2024)
ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords.
0
Attacker Value
Unknown
CVE-2018-1117
Disclosure Date: June 20, 2018 (last updated November 26, 2024)
ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log. In an environment where logs are shared with other parties, this could lead to privilege escalation.
0