{"api_version":"1","generated_at":"2026-04-23T05:05:27+00:00","cve":"CVE-2019-10195","urls":{"html":"https://cve.report/CVE-2019-10195","api":"https://cve.report/api/cve/CVE-2019-10195.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-10195","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-10195"},"summary":{"title":"CVE-2019-10195","description":"A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2019-11-27 08:15:00","updated_at":"2023-11-07 03:02:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/","name":"FEDORA-2019-8e9093da55","refsource":"FEDORA","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] Fedora 30 Update: freeipa-4.8.3-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/","name":"FEDORA-2019-8e9093da55","refsource":"","tags":[],"title":"[SECURITY] Fedora 30 Update: freeipa-4.8.3-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2020:0378","name":"RHSA-2020:0378","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/","name":"FEDORA-2019-c64e1612f5","refsource":"","tags":[],"title":"[SECURITY] Fedora 31 Update: freeipa-4.8.3-1.fc31 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/","name":"FEDORA-2019-c64e1612f5","refsource":"FEDORA","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] Fedora 31 Update: freeipa-4.8.3-1.fc31 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHBA-2019:4268","name":"RHBA-2019:4268","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"1726223 – (CVE-2019-10195) CVE-2019-10195 ipa: Batch API logging user passwords to /var/log/httpd/error_log","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.freeipa.org/page/Releases/4.8.3","name":"https://www.freeipa.org/page/Releases/4.8.3","refsource":"MISC","tags":["Release Notes"],"title":"Releases/4.8.3 - FreeIPA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.freeipa.org/page/Releases/4.7.4","name":"https://www.freeipa.org/page/Releases/4.7.4","refsource":"MISC","tags":["Release Notes"],"title":"Releases/4.7.4 - FreeIPA","mime":"text/html","httpstatus":"200","archivestatus":"500"},{"url":"https://www.freeipa.org/page/Releases/4.6.7","name":"https://www.freeipa.org/page/Releases/4.6.7","refsource":"MISC","tags":["Release Notes"],"title":"Releases/4.6.7 - FreeIPA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-10195","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10195","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"10195","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10195","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"31","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10195","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10195","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"31","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10195","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freeipa","cpe5":"freeipa","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10195","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freeipa","cpe5":"freeipa","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-10195","qid":"377574","title":"Alibaba Cloud Linux Security Update for idm:dl1 (ALINUX3-SA-2022:0117)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-10195","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Red Hat","product":{"product_data":[{"product_name":"IPA","version":{"version_data":[{"version_value":"all IPA 4.6.x versions before 4.6.7"},{"version_value":"all IPA 4.7.x versions before 4.7.4"},{"version_value":"all IPa 4.8.x versions before 4.8.3"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-532"}]},{"description":[{"lang":"eng","value":"CWE-200"}]}]},"references":{"reference_data":[{"url":"https://www.freeipa.org/page/Releases/4.7.4","refsource":"MISC","name":"https://www.freeipa.org/page/Releases/4.7.4"},{"url":"https://www.freeipa.org/page/Releases/4.8.3","refsource":"MISC","name":"https://www.freeipa.org/page/Releases/4.8.3"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195","refsource":"CONFIRM"},{"url":"https://www.freeipa.org/page/Releases/4.6.7","refsource":"MISC","name":"https://www.freeipa.org/page/Releases/4.6.7"},{"refsource":"FEDORA","name":"FEDORA-2019-8e9093da55","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/"},{"refsource":"FEDORA","name":"FEDORA-2019-c64e1612f5","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/"},{"refsource":"REDHAT","name":"RHSA-2020:0378","url":"https://access.redhat.com/errata/RHSA-2020:0378"},{"refsource":"REDHAT","name":"RHBA-2019:4268","url":"https://access.redhat.com/errata/RHBA-2019:4268"}]},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed."}]},"impact":{"cvss":[[{"vectorString":"5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","version":"3.0"}]]}},"nvd":{"publishedDate":"2019-11-27 08:15:00","lastModifiedDate":"2023-11-07 03:02:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8.0","versionEndExcluding":"4.8.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7.0","versionEndExcluding":"4.7.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6.0","versionEndExcluding":"4.6.7","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"10195","Ordinal":"148412","Title":"CVE-2019-10195","CVE":"CVE-2019-10195","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"10195","Ordinal":"1","NoteData":"A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"10195","Ordinal":"2","NoteData":"2019-11-27","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"10195","Ordinal":"3","NoteData":"2020-03-13","Type":"Other","Title":"Modified"}]}}}