Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0218

Опубликовано: 30 янв. 2013
Источник: redhat
CVSS2: 2.1

Описание

The GUI installer in JBoss Enterprise Application Platform (EAP) and Enterprise Web Platform (EWP) 5.2.0 and possibly 5.1.2 uses world-readable permissions for the auto-install XML file, which allows local users to obtain the administrator password and the sucker password by reading this file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 6installerAffected
Red Hat JBoss Enterprise Web Server 1eap-5.2.0Affected
Red Hat JBoss Enterprise Application Platform 5.2FixedRHSA-2013:020630.01.2013
Red Hat JBoss Enterprise Application Platform 6.1FixedRHSA-2013:083320.05.2013
Red Hat JBoss Web Platform 5.2FixedRHSA-2013:020730.01.2013

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=903073Installer: Generated auto-install xml is world readable

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

The GUI installer in JBoss Enterprise Application Platform (EAP) and Enterprise Web Platform (EWP) 5.2.0 and possibly 5.1.2 uses world-readable permissions for the auto-install XML file, which allows local users to obtain the administrator password and the sucker password by reading this file.

nvd
около 13 лет назад

The GUI installer in JBoss Enterprise Application Platform (EAP) and Enterprise Web Platform (EWP) 5.2.0 and possibly 5.1.2 uses world-readable permissions for the auto-install XML file, which allows local users to obtain the administrator password and the sucker password by reading this file.

debian
около 13 лет назад

The GUI installer in JBoss Enterprise Application Platform (EAP) and E ...

github
почти 4 года назад

The GUI installer in JBoss Enterprise Application Platform (EAP) and Enterprise Web Platform (EWP) 5.2.0 and possibly 5.1.2 uses world-readable permissions for the auto-install XML file, which allows local users to obtain the administrator password and the sucker password by reading this file.

2.1 Low

CVSS2