Vulnerability Description
The Web Configuration tool in VMware vCenter Orchestrator (vCO) 4.0 before Update 4, 4.1 before Update 2, and 4.2 before Update 1 places the vCenter Server password in an HTML document, which allows remote authenticated administrators to obtain sensitive information by reading this document.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Vcenter Orchestrator | 4.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/80120
- http://secunia.com/advisories/48408
- http://www.securityfocus.com/bid/52525
- http://www.securitytracker.com/id?1026816
- http://www.vmware.com/security/advisories/VMSA-2012-0005.htmlVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74091
- http://osvdb.org/80120
- http://secunia.com/advisories/48408
- http://www.securityfocus.com/bid/52525
- http://www.securitytracker.com/id?1026816
- http://www.vmware.com/security/advisories/VMSA-2012-0005.htmlVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74091
FAQ
What is CVE-2012-1513?
CVE-2012-1513 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The Web Configuration tool in VMware vCenter Orchestrator (vCO) 4.0 before Update 4, 4.1 before Update 2, and 4.2 before Update 1 places the vCenter Server password in an HTML document, which allows r...
How severe is CVE-2012-1513?
CVE-2012-1513 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1513?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Vcenter Orchestrator.