Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:percona:xtrabackup:*:*:*:*:*:*:*:*", "matchCriteriaId": "C41F3FEA-8774-4F78-8CA4-2DB8228D30CA", "versionEndExcluding": "2.4.20", "versionStartIncluding": "2.4.11", "vulnerable": true}, {"criteria": "cpe:2.3:a:percona:xtrabackup:*:*:*:*:*:*:*:*", "matchCriteriaId": "094242AE-76A9-4937-BE47-D17801A6F22F", "versionEndExcluding": "8.0.11", "versionStartIncluding": "8.0.4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Percona XtraBackup before 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table."}, {"lang": "es", "value": "Percona XtraBackup versiones anteriores a la versi\u00f3n 2.4.20, escribe involuntariamente en la l\u00ednea de comandos en cualquier salida de archivo de copia de seguridad resultante. Esto puede incluir argumentos confidenciales pasados durante el tiempo de ejecuci\u00f3n. Adem\u00e1s, cuando --history se pas\u00f3 en el tiempo de ejecuci\u00f3n, esta l\u00ednea de comando tambi\u00e9n se escribe en la tabla PERCONA_SCHEMA.xtrabackup_history."}], "id": "CVE-2020-10997", "lastModified": "2024-11-21T04:56:32.980", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-04-27T13:15:12.397", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://jira.percona.com/browse/PXB-2142"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.percona.com/blog/2020/04/16/cve-2020-10997-percona-xtrabackup-information-disclosure-of-command-line-arguments/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://jira.percona.com/browse/PXB-2142"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.percona.com/blog/2020/04/16/cve-2020-10997-percona-xtrabackup-information-disclosure-of-command-line-arguments/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}