Improper Cross-boundary Removal of Sensitive Data Affecting qemu-img package, versions <15:4.2.0-34.module+el8.3.0+7976+077be4ec


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating

    Threat Intelligence

    EPSS
    0.07% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-CENTOS8-QEMUIMG-2079862
  • published 26 Jul 2021
  • disclosed 14 Apr 2020

How to fix?

Upgrade Centos:8 qemu-img to version 15:4.2.0-34.module+el8.3.0+7976+077be4ec or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qemu-img package and not the qemu-img package as distributed by Centos. See How to fix? for Centos:8 relevant fixed versions and status.

An information disclosure vulnerability was found in libvirt in versions before 6.3.0. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw allows an attacker to access potentially sensitive information in the domain configuration via the dumpxml command.

CVSS Scores

version 3.1
Expand this section

NVD

6.5 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

Red Hat

6.5 medium