vulnerability

Oracle Linux: CVE-2017-15112: ELSA-2019-2137: keycloak-httpd-client-install security, bug fix, and enhancement update (LOW) (Multiple Advisories)

Severity
2
CVSS
(AV:L/AC:L/Au:S/C:P/I:N/A:N)
Published
Jan 5, 2018
Added
Aug 15, 2019
Modified
Jan 7, 2025

Description

keycloak-httpd-client-install versions before 0.8 allow users to insecurely pass password through command line, leaking it via command history and process info to other local users.
In keycloak-http-client-install prior to version 0.8, the admin password could be provided through a command-line argument. This might result in the password being leaked through shell history, or becoming visible to a local attacker at the time the program is running.

Solution(s)

oracle-linux-upgrade-keycloak-httpd-client-installoracle-linux-upgrade-python2-keycloak-httpd-client-install
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.