First published: Sun Jul 17 2005(Updated: )
Oracle JDeveloper 9.0.4, 9.0.5, and 10.1.2 passes the cleartext password as a parameter when starting sqlplus, which allows local users to gain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDeveloper | =9.0.4 | |
Oracle JDeveloper | =9.0.5 | |
Oracle JDeveloper | =10.1.2 |
http://www.red-database-security.com/advisory/oracle_jdeveloper_passes_plaintext_password.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2291 is classified as a medium severity vulnerability due to its potential for information disclosure.
To fix CVE-2005-2291, it is recommended to upgrade to a newer, patched version of Oracle JDeveloper that does not expose passwords in cleartext.
CVE-2005-2291 affects local users of Oracle JDeveloper versions 9.0.4, 9.0.5, and 10.1.2.
CVE-2005-2291 is an information disclosure vulnerability that allows unauthorized access to sensitive data.
CVE-2005-2291 cannot be exploited remotely as it requires local access to the system running the affected version of Oracle JDeveloper.