{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "title": "Spacewalk-backend: Information Disclosure via cleartext passwords in error messages",
    "tracking": {
      "current_release_date": "2026-05-07T12:10:57+00:00",
      "generator": {
        "date": "2026-05-07T12:10:57+00:00",
        "engine": {
          "name": "CSAF Generator",
          "version": "2.0.1"
        }
      },
      "id": "CVE-2012-0059",
      "initial_release_date": "2014-02-05T18:00:00+00:00",
      "revision_history": [
        {
          "date": "2026-05-07T12:10:57+00:00",
          "number": "1",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "category": "vendor",
        "name": "Red Hat",
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux 6-els",
            "product": {
              "name": "Red Hat Enterprise Linux 6-els",
              "product_id": "rhel-6-els.els",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:rhel_els:6"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux 7-els",
            "product": {
              "name": "Red Hat Enterprise Linux 7-els",
              "product_id": "rhel-7-els.els",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:rhel_els:7"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat Satellite",
            "product": {
              "name": "Red Hat Satellite",
              "product_id": "rhn_satellite_5.4::el5",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:network_proxy:5.4::el5"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat Satellite",
            "product": {
              "name": "Red Hat Satellite",
              "product_id": "rhn_satellite_5.4::el6",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:network_proxy:5.4::el6"
              }
            }
          },
          {
            "category": "product_version",
            "name": "rhn-client-tools",
            "product": {
              "name": "rhn-client-tools",
              "product_id": "rhn-client-tools.src",
              "product_identification_helper": {
                "purl": "pkg:rpm/redhat/rhn-client-tools?arch=src"
              }
            }
          },
          {
            "category": "product_version",
            "name": "rhnsd",
            "product": {
              "name": "rhnsd",
              "product_id": "rhnsd.src",
              "product_identification_helper": {
                "purl": "pkg:rpm/redhat/rhnsd?arch=src"
              }
            }
          },
          {
            "category": "product_version",
            "name": "spacewalk-backend",
            "product": {
              "name": "spacewalk-backend",
              "product_id": "spacewalk-backend-0:1.2.13-66.el5sat",
              "product_identification_helper": {
                "purl": "pkg:rpm/redhat/spacewalk-backend@1.2.13-66.el5sat?epoch=0"
              }
            }
          },
          {
            "category": "product_version",
            "name": "spacewalk-backend",
            "product": {
              "name": "spacewalk-backend",
              "product_id": "spacewalk-backend-0:1.2.13-66.el6sat",
              "product_identification_helper": {
                "purl": "pkg:rpm/redhat/spacewalk-backend@1.2.13-66.el6sat?epoch=0"
              }
            }
          },
          {
            "category": "product_version",
            "name": "yum-rhn-plugin",
            "product": {
              "name": "yum-rhn-plugin",
              "product_id": "yum-rhn-plugin.src",
              "product_identification_helper": {
                "purl": "pkg:rpm/redhat/yum-rhn-plugin?arch=src"
              }
            }
          }
        ]
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhn-client-tools.src as a component of Red Hat Enterprise Linux 6-els",
          "product_id": "rhel-6-els.els:rhn-client-tools.src"
        },
        "product_reference": "rhn-client-tools.src",
        "relates_to_product_reference": "rhel-6-els.els"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhnsd.src as a component of Red Hat Enterprise Linux 7-els",
          "product_id": "rhel-7-els.els:rhnsd.src"
        },
        "product_reference": "rhnsd.src",
        "relates_to_product_reference": "rhel-7-els.els"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhnsd.src as a component of Red Hat Enterprise Linux 6-els",
          "product_id": "rhel-6-els.els:rhnsd.src"
        },
        "product_reference": "rhnsd.src",
        "relates_to_product_reference": "rhel-6-els.els"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "spacewalk-backend-0:1.2.13-66.el5sat as a component of Red Hat Satellite",
          "product_id": "rhn_satellite_5.4::el5:spacewalk-backend-0:1.2.13-66.el5sat"
        },
        "product_reference": "spacewalk-backend-0:1.2.13-66.el5sat",
        "relates_to_product_reference": "rhn_satellite_5.4::el5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "spacewalk-backend-0:1.2.13-66.el6sat as a component of Red Hat Satellite",
          "product_id": "rhn_satellite_5.4::el6:spacewalk-backend-0:1.2.13-66.el6sat"
        },
        "product_reference": "spacewalk-backend-0:1.2.13-66.el6sat",
        "relates_to_product_reference": "rhn_satellite_5.4::el6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "yum-rhn-plugin.src as a component of Red Hat Enterprise Linux 6-els",
          "product_id": "rhel-6-els.els:yum-rhn-plugin.src"
        },
        "product_reference": "yum-rhn-plugin.src",
        "relates_to_product_reference": "rhel-6-els.els"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "yum-rhn-plugin.src as a component of Red Hat Enterprise Linux 7-els",
          "product_id": "rhel-7-els.els:yum-rhn-plugin.src"
        },
        "product_reference": "yum-rhn-plugin.src",
        "relates_to_product_reference": "rhel-7-els.els"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2012-0059",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "discovery_date": "2026-04-02T15:01:48+00:00",
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Spacewalk-backend. This information disclosure vulnerability occurs when a system registration XML-RPC call fails, causing cleartext user passwords to be included in error messages. Remote administrators can exploit this by reading server logs and emails, leading to the unauthorized disclosure of user passwords.",
          "title": "Vulnerability description"
        }
      ],
      "product_status": {
        "fixed": [
          "rhn_satellite_5.4::el5:spacewalk-backend-0:1.2.13-66.el5sat",
          "rhn_satellite_5.4::el6:spacewalk-backend-0:1.2.13-66.el6sat"
        ],
        "known_affected": [
          "rhel-6-els.els:rhn-client-tools.src",
          "rhel-6-els.els:rhnsd.src",
          "rhel-6-els.els:yum-rhn-plugin.src",
          "rhel-7-els.els:rhnsd.src",
          "rhel-7-els.els:yum-rhn-plugin.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-0059"
        },
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0059"
        },
        {
          "category": "external",
          "summary": "www.cve.org",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-0059"
        }
      ],
      "remediations": [
        {
          "category": "no_fix_planned",
          "details": "Out of support scope",
          "product_ids": [
            "rhel-6-els.els:rhn-client-tools.src",
            "rhel-6-els.els:rhnsd.src",
            "rhel-6-els.els:yum-rhn-plugin.src",
            "rhel-7-els.els:rhnsd.src",
            "rhel-7-els.els:yum-rhn-plugin.src"
          ]
        },
        {
          "category": "vendor_fix",
          "date": "2012-02-06T18:15:41+00:00",
          "details": "Apply advisory RHSA-2012:0101 as per vendors instructions.",
          "product_ids": [
            "rhn_satellite_5.4::el5:spacewalk-backend-0:1.2.13-66.el5sat",
            "rhn_satellite_5.4::el6:spacewalk-backend-0:1.2.13-66.el6sat"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2012:0101"
        },
        {
          "category": "vendor_fix",
          "date": "2012-02-06T18:15:29+00:00",
          "details": "Apply advisory RHSA-2012:0102 as per vendors instructions.",
          "product_ids": [
            "rhn_satellite_5.4::el5:spacewalk-backend-0:1.2.13-66.el5sat",
            "rhn_satellite_5.4::el6:spacewalk-backend-0:1.2.13-66.el6sat"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2012:0102"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "rhel-6-els.els:rhn-client-tools.src",
            "rhel-6-els.els:rhnsd.src",
            "rhel-6-els.els:yum-rhn-plugin.src",
            "rhel-7-els.els:rhnsd.src",
            "rhel-7-els.els:yum-rhn-plugin.src"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM"
          },
          "products": [
            "rhel-6-els.els:rhn-client-tools.src",
            "rhel-6-els.els:rhnsd.src",
            "rhel-6-els.els:yum-rhn-plugin.src",
            "rhel-7-els.els:rhnsd.src",
            "rhel-7-els.els:yum-rhn-plugin.src",
            "rhn_satellite_5.4::el5:spacewalk-backend-0:1.2.13-66.el5sat",
            "rhn_satellite_5.4::el6:spacewalk-backend-0:1.2.13-66.el6sat"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate",
          "product_ids": [
            "rhel-6-els.els:rhn-client-tools.src",
            "rhel-6-els.els:rhnsd.src",
            "rhel-6-els.els:yum-rhn-plugin.src",
            "rhel-7-els.els:rhnsd.src",
            "rhel-7-els.els:yum-rhn-plugin.src",
            "rhn_satellite_5.4::el5:spacewalk-backend-0:1.2.13-66.el5sat",
            "rhn_satellite_5.4::el6:spacewalk-backend-0:1.2.13-66.el6sat"
          ]
        }
      ],
      "title": "Spacewalk-backend: Information Disclosure via cleartext passwords in error messages"
    }
  ]
}