In at least the qemu implementation of virDomainGetXMLDesc, the use of the flag VIR_DOMAIN_XML_MIGRATABLE (which is usable from a read-only connection) triggers the implicit use of VIR_DOMAIN_XML_SECURE prior to calling qemuDomainFormatXML. However, the use of VIR_DOMAIN_XML_SECURE is supposed to be restricted to read-write clients only. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to cause leak certain limited information from the domain xml file. Reference: https://www.redhat.com/archives/libvir-list/2014-November/msg00114.html
Statement: This issue does not affect the versions of libvirt packages as shipped with Red Hat Enterprise Linux 5. This issue does affect the versions of libvirt packages as shipped with Red Hat Enterprise Linux 6 and 7. Future updates may address this issue in the respective Red Hat Enterprise Linux releases.
Created libvirt tracking bugs for this issue: Affects: fedora-all [bug 1160822]
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1873 https://rhn.redhat.com/errata/RHSA-2014-1873.html
libvirt-1.1.3.8-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
Acknowledgements: This issue was discovered by Eric Blake of Red Hat.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:0008 https://rhn.redhat.com/errata/RHSA-2015-0008.html