You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Tool Description: A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Custom Description: bhhh
The text was updated successfully, but these errors were encountered:
A low severity vulnerability has been discovered in your project.
Project Name: NodeJS2
Scanner Name: trivy
Cwe ID: 209
Cwe Name: Information Exposure Through an Error Message
Cwe Link: https://cwe.mitre.org/data/definitions/209.html
CVE ID: CVE-2022-0563
Target: redis:latest (debian 11.3)
Packages:
References:
Training(Secure Code Warrior):
Name: Generation of Error Message Containing Sensitive Information
Description: The software generates an error message that includes sensitive information about its environment, users, or associated data.
Link: https://portal.securecodewarrior.com/?utm_source=partner-integration:kondukto#/website-trial/web/infoexposure/errordetails
Videos:
Tool Description: A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Custom Description: bhhh
The text was updated successfully, but these errors were encountered: