A network security audit on a customer infrastructure reported a vulnerability on the cerebro http (port 2020) who is open on http in every CVM and without any security prompt.
Some sensitives informations are visible :
- AOS version : el7.3-release-euphrates-5.10.7-stable-...
- VM Names
- Protection Domain names
- Witness ip address
Is there’s a way to secure this component ?
Best answer by sbarabView original
Was there a pointer to any specific CVE in that security report?
Yes it use Protection domains.
No it’s not a CVE related vulnerability. The report say just that an attaker can view some sensitive informations without any security. It says also that an attack of the type reflected XSS vulnerability (non persistent) can be possible with the PD parameter.
thank you for all this informations. I will do some network testings and report this to the concerned person .