Security
Headlines
HeadlinesLatestCVEs

Headline

Qualys Cloud Agent Arbitrary Code Execution

The Unqork Security team discovered multiple security vulnerabilities in the Qualys Cloud Agent including arbitrary code execution.

Packet Storm
#vulnerability#linux#zero_day
The Unqork Security team discovered multiple security vulnerabilities inthe Qualys Cloud Agent, to include arbitrary code execution.CVE-2022-29549 (Arbitrary Code Execution)https://nvd.nist.gov/vuln/detail/CVE-2022-29549CVE-2022-29550 (Sensitive Information Disclosure)https://nvd.nist.gov/vuln/detail/CVE-2022-29550Read more:https://www.unqork.com/resources/unqork-and-qualys-partner-to-resolve-zero-day-vulnerabilitieshttps://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux

Related news

CVE-2022-29550: Qualys Security Updates: Cloud Agent for Linux | Qualys Security Blog

** DISPUTED ** An issue was discovered in Qualys Cloud Agent 4.8.0-49. It writes "ps auxwwe" output to the /var/log/qualys/qualys-cloud-agent-scan.log file. This may, for example, unexpectedly write credentials (from environment variables) to disk in cleartext. NOTE: there are no common circumstances in which qualys-cloud-agent-scan.log can be read by a user other than root; however, the file contents could be exposed through site-specific operational practices. The vendor does NOT characterize this as a vulnerability because the ps data collection is intentional, and would only capture credentials on a machine that was already affected by the CWE-214 weakness.

CVE-2022-29550: Qualys Security Updates: Cloud Agent for Linux | Qualys Security Blog

** DISPUTED ** An issue was discovered in Qualys Cloud Agent 4.8.0-49. It writes "ps auxwwe" output to the /var/log/qualys/qualys-cloud-agent-scan.log file. This may, for example, unexpectedly write credentials (from environment variables) to disk in cleartext. NOTE: there are no common circumstances in which qualys-cloud-agent-scan.log can be read by a user other than root; however, the file contents could be exposed through site-specific operational practices. The vendor does NOT characterize this as a vulnerability because the ps data collection is intentional, and would only capture credentials on a machine that was already affected by the CWE-214 weakness.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution