Show plain JSON{"containers": {"cna": {"affected": [{"product": "InsightVM", "vendor": "Rapid7", "versions": [{"lessThanOrEqual": "6.5.49", "status": "affected", "version": "6.5.49", "versionType": "custom"}, {"lessThan": "6.5.11*", "status": "affected", "version": "6.5.11", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "This issue was discovered, and reported to Rapid7, by Robert Elliott from IBM Security. It is being disclosed in accordance Rapid7's vulnerability disclosure policy (https://www.rapid7.com/disclosure/)."}], "datePublic": "2019-01-30T00:00:00", "descriptions": [{"lang": "en", "value": "Users with Site-level permissions can access files containing the username-encrypted passwords of Security Console Global Administrators and clear-text passwords for restoring backups, as well as the salt for those passwords. Valid credentials are required to access these files and malicious users would still need to perform additional work to decrypt the credentials and escalate privileges. This issue affects: Rapid7 InsightVM versions 6.5.11 through 6.5.49."}], "metrics": [{"cvssV3_0": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-257", "description": "CWE-257", "lang": "en", "type": "CWE"}]}, {"descriptions": [{"description": "Storing Passwords in a Recoverable Format", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2019-04-09T15:27:05", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://help.rapid7.com/insightvm/en-us/release-notes/#6.5.50"}], "solutions": [{"lang": "en", "value": "Update the Security Console to version 6.5.50 or later."}], "source": {"defect": ["NEX-51442"], "discovery": "USER"}, "title": "Rapid7 InsightVM Stored Credential Exposure", "x_generator": {"engine": "Vulnogram 0.0.6"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@rapid7.com", "DATE_PUBLIC": "2019-01-30T14:00:00.000Z", "ID": "CVE-2019-5615", "STATE": "PUBLIC", "TITLE": "Rapid7 InsightVM Stored Credential Exposure"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "InsightVM", "version": {"version_data": [{"version_affected": "<=", "version_name": "6.5.49", "version_value": "6.5.49"}, {"version_affected": ">=", "version_name": "6.5.11", "version_value": "6.5.11"}]}}]}, "vendor_name": "Rapid7"}]}}, "credit": [{"lang": "eng", "value": "This issue was discovered, and reported to Rapid7, by Robert Elliott from IBM Security. It is being disclosed in accordance Rapid7's vulnerability disclosure policy (https://www.rapid7.com/disclosure/)."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Users with Site-level permissions can access files containing the username-encrypted passwords of Security Console Global Administrators and clear-text passwords for restoring backups, as well as the salt for those passwords. Valid credentials are required to access these files and malicious users would still need to perform additional work to decrypt the credentials and escalate privileges. This issue affects: Rapid7 InsightVM versions 6.5.11 through 6.5.49."}]}, "generator": {"engine": "Vulnogram 0.0.6"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-257"}]}, {"description": [{"lang": "eng", "value": "Storing Passwords in a Recoverable Format"}]}]}, "references": {"reference_data": [{"name": "https://help.rapid7.com/insightvm/en-us/release-notes/#6.5.50", "refsource": "CONFIRM", "url": "https://help.rapid7.com/insightvm/en-us/release-notes/#6.5.50"}]}, "solution": [{"lang": "en", "value": "Update the Security Console to version 6.5.50 or later."}], "source": {"defect": ["NEX-51442"], "discovery": "USER"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T20:01:51.559Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://help.rapid7.com/insightvm/en-us/release-notes/#6.5.50"}]}]}, "cveMetadata": {"assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2019-5615", "datePublished": "2019-04-09T15:27:05.703271Z", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-09-17T03:02:06.706Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}