Description
A flaw was found in Spacewalk-backend. This information disclosure vulnerability occurs when a system registration XML-RPC call fails, causing cleartext user passwords to be included in error messages. Remote administrators can exploit this by reading server logs and emails, leading to the unauthorized disclosure of user passwords.
Published: 2014-02-05
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2012-0097 Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email.
History

Fri, 03 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email. A flaw was found in Spacewalk-backend. This information disclosure vulnerability occurs when a system registration XML-RPC call fails, causing cleartext user passwords to be included in error messages. Remote administrators can exploit this by reading server logs and emails, leading to the unauthorized disclosure of user passwords.
Title Spacewalk: RHN user password disclosure upon failed system registration Spacewalk-backend: spacewalk-backend: information disclosure via cleartext passwords in error messages
First Time appeared Redhat enterprise Linux
Weaknesses CWE-209
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
Vendors & Products Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Redhat Enterprise Linux Network Proxy Network Satellite Satellite
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-02T23:42:30.680Z

Reserved: 2011-12-07T00:00:00.000Z

Link: CVE-2012-0059

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-02-05T18:55:06.223

Modified: 2026-04-03T00:16:03.453

Link: CVE-2012-0059

cve-icon Redhat

Severity : Low

Publid Date: 2012-01-10T00:00:00Z

Links: CVE-2012-0059 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses