vulnerability
Oracle Linux: CVE-2017-15112: ELSA-2019-2137: keycloak-httpd-client-install security, bug fix, and enhancement update (LOW) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:S/C:P/I:N/A:N) | Jan 5, 2018 | Aug 15, 2019 | Jan 7, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:S/C:P/I:N/A:N)
Published
Jan 5, 2018
Added
Aug 15, 2019
Modified
Jan 7, 2025
Description
keycloak-httpd-client-install versions before 0.8 allow users to insecurely pass password through command line, leaking it via command history and process info to other local users.
In keycloak-http-client-install prior to version 0.8, the admin password could be provided through a command-line argument. This might result in the password being leaked through shell history, or becoming visible to a local attacker at the time the program is running.
In keycloak-http-client-install prior to version 0.8, the admin password could be provided through a command-line argument. This might result in the password being leaked through shell history, or becoming visible to a local attacker at the time the program is running.
Solution(s)
oracle-linux-upgrade-keycloak-httpd-client-installoracle-linux-upgrade-python2-keycloak-httpd-client-install

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.