Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-3427

Опубликовано: 16 окт. 2012
Источник: redhat
CVSS2: 2.1

Описание

EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permissions for /var/cache/jboss-ec2-eap/, which allows local users to read sensitive information such as Amazon Web Services (AWS) credentials by reading files in the directory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 1unknownUnder investigation
Red Hat JBoss Enterprise Application Platform 5 for RHEL 6jboss-ec2-eapFixedRHSA-2012:137616.10.2012

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=843335AMI: insecure default file permissions for /var/cache/jboss-ec2-eap

2.1 Low

CVSS2

Связанные уязвимости

nvd
около 12 лет назад

EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permissions for /var/cache/jboss-ec2-eap/, which allows local users to read sensitive information such as Amazon Web Services (AWS) credentials by reading files in the directory.

debian
около 12 лет назад

EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platfor ...

github
больше 3 лет назад

EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permissions for /var/cache/jboss-ec2-eap/, which allows local users to read sensitive information such as Amazon Web Services (AWS) credentials by reading files in the directory.

2.1 Low

CVSS2