{"containers":{"cna":{"title":"Rhn-proxy: rhn-satellite: rhn-proxy: information disclosure via clear-text credential transmission when accessing rhn satellite","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in rhn-proxy. This vulnerability may allow the rhn-proxy to transmit user credentials in clear-text when it accesses RHN Satellite. This could lead to information disclosure, where sensitive authentication details are exposed to unauthorized parties."}],"affected":[{"vendor":"Red Hat","product":"Red Hat Satellite 6","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"satellite","defaultStatus":"unknown","cpes":["cpe:/a:redhat:satellite:6"]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2012-5562","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/cve-2012-5562"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5562"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5562"}],"datePublic":"2019-12-02T18:12:41.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-319: Cleartext Transmission of Sensitive Information","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}],"timeline":[{"lang":"en","time":"2026-04-02T15:02:44.461Z","value":"Reported to Red Hat."},{"lang":"en","time":"2019-12-02T18:12:41.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-04-09T17:26:56.549Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T21:14:16.046Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5562"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5562"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://access.redhat.com/security/cve/cve-2012-5562"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2012-5562","datePublished":"2019-12-02T18:12:41.000Z","dateReserved":"2012-10-24T00:00:00.000Z","dateUpdated":"2026-04-09T17:26:56.549Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}