Tool Description: A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Due Date: 2022-11-03
A low severity vulnerability has been discovered in your project.
Project Name: twrap-go
Scanner Name: trivy
Cwe ID: 209
Cwe Name: Information Exposure Through an Error Message
Cwe Link: https://cwe.mitre.org/data/definitions/209.html
CVE ID: CVE-2022-0563
Target: redis:latest (debian 11.5)
Packages:
References:
Training(Secure Code Warrior):
Name: Generation of Error Message Containing Sensitive Information
Description: The software generates an error message that includes sensitive information about its environment, users, or associated data.
Link: https://portal.securecodewarrior.com/?utm_source=partner-integration:kondukto#/contextual-microlearning/web/infoexposure/errordetails
Videos:
Tool Description: A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Custom Description: test
Kondukto Link: http://79.kondukto.local/projects/634fe837a5be8478724352c4/vulns/appsec?page=1&perPage=15&id=in:6362476983e330d938697b2a Deeplink: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0563