First published: Tue Jan 22 2013(Updated: )
Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CloudStack | =4.0.0-incubating | |
Citrix CloudPlatform | <=3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5616 is classified as a medium severity vulnerability due to the exposure of sensitive information.
To fix CVE-2012-5616, update Apache CloudStack to version 4.0.1 or later and Citrix CloudPlatform to version 3.0.6 or later.
CVE-2012-5616 affects Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform versions prior to 3.0.6.
CVE-2012-5616 exposes sensitive information such as SSH private keys and host passwords stored in the log4j.conf file.
Local users with access to the log4j.conf file can exploit CVE-2012-5616 to obtain sensitive information.