Shorter and maybe final wording

This commit is contained in:
Daniel Goldberg 2018-03-28 15:11:34 +03:00
parent 095510e8e2
commit 1048e12fbd
1 changed files with 4 additions and 4 deletions

View File

@ -315,9 +315,9 @@ class ReportPageComponent extends AuthComponent {
<li>Machines are accessible using passwords supplied by the user during the Monkeys <li>Machines are accessible using passwords supplied by the user during the Monkeys
configuration.</li> : null} configuration.</li> : null}
{this.state.report.overview.issues[this.Issue.AZURE] ? {this.state.report.overview.issues[this.Issue.AZURE] ?
<li>Machines contained plain text passwords accessible to attackers. For more info see <a <li>Azure machines expose plaintext passwords. (<a
href="https://www.guardicore.com/2018/03/recovering-plaintext-passwords-azure/" href="https://www.guardicore.com/2018/03/recovering-plaintext-passwords-azure/"
>Harvesting Azure Passwords</a>.</li> : null} >More info</a>)</li> : null}
</ul> </ul>
</div> </div>
@ -596,9 +596,9 @@ class ReportPageComponent extends AuthComponent {
generateAzureIssue(issue) { generateAzureIssue(issue) {
return ( return (
<li> <li>
Azure VM Access configuration files should be deleted after use to avoid credential leakage. Delete VM Access plugin configuration files.
<CollapsibleWellComponent> <CollapsibleWellComponent>
VM Access plugin configuration files were left on the machine. Credentials could be stolen from <span Credentials could be stolen from <span
className="label label-primary">{issue.machine}</span> for the following users<span className="label label-primary">{issue.machine}</span> for the following users<span
className="label label-primary">{issue.users}</span>. Read more about the security issue and remediation <a className="label label-primary">{issue.users}</span>. Read more about the security issue and remediation <a
href="https://www.guardicore.com/2018/03/recovering-plaintext-passwords-azure/" href="https://www.guardicore.com/2018/03/recovering-plaintext-passwords-azure/"