vulnerability
Oracle Linux: CVE-2017-15112: ELSA-2019-2137: keycloak-httpd-client-install security, bug fix, and enhancement update (LOW)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Jan 5, 2018 | Aug 15, 2019 | Dec 3, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jan 5, 2018
Added
Aug 15, 2019
Modified
Dec 3, 2025
Description
keycloak-httpd-client-install versions before 0.8 allow users to insecurely pass password through command line, leaking it via command history and process info to other local users.
In keycloak-http-client-install prior to version 0.8, the admin password could be provided through a command-line argument. This might result in the password being leaked through shell history, or becoming visible to a local attacker at the time the program is running.
In keycloak-http-client-install prior to version 0.8, the admin password could be provided through a command-line argument. This might result in the password being leaked through shell history, or becoming visible to a local attacker at the time the program is running.
Solutions
oracle-linux-upgrade-keycloak-httpd-client-installoracle-linux-upgrade-python2-keycloak-httpd-client-install
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.