First published: Fri Dec 05 2008(Updated: )
The ClearQuest Maintenance Tool in IBM Rational ClearQuest 7 before 7.1 stores the database password in cleartext in an object in a ClearQuest connection profile or export file, which allows remote authenticated users to obtain sensitive information by locating the password object within the object tree.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational ClearQuest | =7.0.1.1 | |
IBM Rational ClearQuest | =7.0.0.1 | |
IBM Rational ClearQuest | =7.0.0.2 | |
IBM Rational ClearQuest | =7.0 | |
IBM Rational ClearQuest | =7.0.0.0 | |
IBM Rational ClearQuest | =7.0.0.3 | |
IBM Rational ClearQuest | =7.0.1 | |
IBM Rational ClearQuest | =7.0.1.2 | |
IBM Rational ClearQuest | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5327 is classified as a medium severity vulnerability due to the exposure of sensitive database credentials.
To fix CVE-2008-5327, update IBM Rational ClearQuest to version 7.1 or later, which resolves the cleartext storage issue.
Affected users include those utilizing IBM Rational ClearQuest versions 7.0 and earlier, including various incremental versions.
CVE-2008-5327 exposes sensitive database passwords stored in cleartext, which can be accessed by remote authenticated users.
There is no official workaround for CVE-2008-5327; upgrading to a fixed version is the recommended approach.