It was found that the ovirt-engine-dwh setup script would log the history database password in plaintext to a world-readable file. An attacker with a local user account on the RHEV-M server could use this flaw to access, read and modify the reports database.
Acknowledgements: This issue was discovered by Red Hat.
*** Bug 1086248 has been marked as a duplicate of this bug. ***
*** Bug 1086241 has been marked as a duplicate of this bug. ***
This issue has been addressed in following products: RHEV Manager version 3.3 Via RHSA-2014:0559 https://rhn.redhat.com/errata/RHSA-2014-0559.html