CVE-2021-3551

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-3551
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3551.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-3551
Related
Published
2022-02-16T17:15:11Z
Modified
2024-09-18T03:15:04.229850Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

References

Affected packages

Debian:11 / dogtag-pki

Package

Name
dogtag-pki
Purl
pkg:deb/debian/dogtag-pki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*

10.10.2-3
10.10.6-1

11.*

11.0.0-1
11.0.3-1
11.0.3-2
11.0.3-3
11.0.3-4
11.0.6-1
11.0.6-2
11.2.1-1
11.2.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}