Description
A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4931 | A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file. |
Github GHSA |
GHSA-q9g8-9hpp-xc82 | nsufficiently Protected Credentials in ActiveMQ Artemis |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.722Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10727
No data.
Status : Modified
Published: 2020-06-26T16:15:12.063
Modified: 2024-11-21T04:55:56.620
Link: CVE-2020-10727
OpenCVE Enrichment
No data.
EUVD
Github GHSA