{"id":"CVE-2017-15104","details":"An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.","aliases":["GHSA-q9vw-wr57-xjv3","GO-2022-0866"],"modified":"2026-04-10T03:59:47.412013Z","published":"2017-12-18T19:29:00.247Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3481"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2017-15104"},{"type":"ADVISORY","url":"https://github.com/heketi/heketi/releases/tag/v5.0.1"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510149"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/heketi/heketi","events":[{"introduced":"0"},{"last_affected":"e0ec337aa22a2ddbd89a5e2338280f621c371755"},{"introduced":"0"},{"last_affected":"da761a7d57de0c1bebd0922402f340ecbcd517a2"},{"fixed":"bee7dfdcea12a378d8496a50b6a46f3e950ec5d2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.0.0"},{"introduced":"0"},{"last_affected":"7.0"}]}}],"versions":["1.0.0","v0.1","v0.2","v0.3","v0.4","v0.5","v1.1.0-dev","v1.2.0-dev","v1.3.0-dev","v1.4.0-dev","v2.0.0rc1","v2.0.1-dev","v2.0.2-dev","v2.0.3-dev","v2.0.4-dev","v2.0.5-dev","v2.0.6","v2.1.0-dev","v3.0.0","v4.0.0","v5.0.0","v6.0.0","v7.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15104.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}