| CVE-ID |
CVE-2018-1000060
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
| Description |
| Sensu, Inc. Sensu Core version Before 1.2.0 & before commit
46ff10023e8cbf1b6978838f47c51b20b98fe30b contains a CWE-522
vulnerability in Sensu::Utilities.redact_sensitive() that can result
in sensitive configuration data (e.g. passwords) may be logged in
clear-text. This attack appear to be exploitable via victims with
configuration matching a specific pattern will observe sensitive data
outputted in their service log files. This vulnerability appears to
have been fixed in 1.2.1 and later, after commit
46ff10023e8cbf1b6978838f47c51b20b98fe30b.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| Distributed Weakness Filing Project |
| Date Entry Created |
| 20180209 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20180209) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
|
|
For More Information: cve@mitre.org
|