Description
An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials.
References (2)
Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/101997
Mailing List, Third Party Advisory x_refsource_confirm
http://seclists.org/fulldisclosure/2017/Nov/35
Scores
CVSS v3
8.4
EPSS
0.0008
EPSS Percentile
23.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-532
Status
published
Products (5)
dell/emc_scaleio
2.0.1.0
dell/emc_scaleio
2.0.1.1
dell/emc_scaleio
2.0.1.2
dell/emc_scaleio
2.0.1.3
n/a/EMC ScaleIO EMC ScaleIO 2.0.1.x
EMC ScaleIO EMC ScaleIO 2.0.1.x
Published
Nov 28, 2017
Tracked Since
Feb 18, 2026