First published: Wed Jan 02 2019(Updated: )
aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/aria2 | 1.35.0-3 1.36.0-1 1.37.0+debian-3 | |
aria2 | =1.33.1 | |
Debian | =8.0 | |
Debian | =9.0 | |
Fedora | =28 | |
Fedora | =29 | |
Fedora | =30 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3500 has a medium severity level due to the potential exposure of sensitive information.
To fix CVE-2019-3500, upgrade aria2 to versions 1.35.0-3, 1.36.0-1, or 1.37.0+debian-3.
CVE-2019-3500 is an information disclosure vulnerability affecting aria2 when logging credentials.
Versions of aria2 prior to 1.35.0 are affected by CVE-2019-3500.
Yes, local users can exploit CVE-2019-3500 by accessing logs that may contain HTTP Basic Authentication credentials.