Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0058

Опубликовано: 24 фев. 2014
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.

It was found that the security audit functionality logged request parameters in plain text. This may have caused passwords to be included in the audit log files when using BASIC or FORM-based authentication. A local attacker with access to audit log files could possibly use this flaw to obtain application or server authentication credentials.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 5auditNot affected
Red Hat JBoss Operations Network 3eapAffected
Red Hat JBoss BPMS 6.0eapFixedRHSA-2014:129123.09.2014
Red Hat JBoss BRMS 6.0eapFixedRHSA-2014:129023.09.2014
Red Hat JBoss Data Grid 6.3eapFixedRHSA-2014:089516.07.2014
Red Hat JBoss Data Virtualization 6.0eapFixedRHSA-2015:003412.01.2015
Red Hat JBoss Enterprise Application Platform 6.2FixedRHSA-2014:020524.02.2014
Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 5jboss-as-webFixedRHSA-2014:020424.02.2014
Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 6jboss-as-webFixedRHSA-2014:020424.02.2014
Red Hat JBoss Fuse Service Works 6.0eapFixedRHSA-2014:199515.12.2014

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1063641EAP6: Plain text password logging during security audit

EPSS

Процентиль: 19%
0.00061
Низкий

1.9 Low

CVSS2

Связанные уязвимости

nvd
почти 12 лет назад

The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.

github
больше 3 лет назад

The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.

EPSS

Процентиль: 19%
0.00061
Низкий

1.9 Low

CVSS2