A flaw was found in Spacewalk-backend. This information disclosure vulnerability occurs when a system registration XML-RPC call fails, causing cleartext user passwords to be included in error messages. Remote administrators can exploit this by reading server logs and emails, leading to the unauthorized disclosure of user passwords.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email. | A flaw was found in Spacewalk-backend. This information disclosure vulnerability occurs when a system registration XML-RPC call fails, causing cleartext user passwords to be included in error messages. Remote administrators can exploit this by reading server logs and emails, leading to the unauthorized disclosure of user passwords. |
| Title | Spacewalk: RHN user password disclosure upon failed system registration | Spacewalk-backend: spacewalk-backend: information disclosure via cleartext passwords in error messages |
| First Time appeared |
Redhat enterprise Linux
|
|
| Weaknesses | CWE-209 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 |
|
| Vendors & Products |
Redhat enterprise Linux
|
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2014-02-05T18:00:00.000Z
Updated: 2026-04-02T23:42:30.680Z
Reserved: 2011-12-07T00:00:00.000Z
Link: CVE-2012-0059
No data.
Status : Deferred
Published: 2014-02-05T18:55:06.223
Modified: 2026-04-03T00:16:03.453
Link: CVE-2012-0059