World Readable Heketi Configuration File Allows Password Extraction

World Readable Heketi Configuration File Allows Password Extraction

CVE-2017-15104 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.

Learn more about our Cis Benchmark Audit For Server Software.