Candlepin Log File Exposes Database Credentials, Allowing Unauthorized Access and Package Update Manipulation

Candlepin Log File Exposes Database Credentials, Allowing Unauthorized Access and Package Update Manipulation

CVE-2019-3891 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

It was discovered that a world-readable log file belonging to Candlepin component of Red Hat Satellite 6.4 leaked the credentials of the Candlepin database. A malicious user with local access to a Satellite host can use those credentials to modify the database and prevent Satellite from fetching package updates, thus preventing all Satellite hosts from accessing those updates.

Learn more about our User Device Pen Test.