First published: Tue Jan 10 2012(Updated: )
It was found that the NonManagedConnectionFactory would log the username and password in cleartext when an exception was thrown. A local attacker could exploit this flaw by reading the password from the log file, if they had appropriate permissions to read the log file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =5.1.2 | |
JBoss Enterprise Application Platform | =5.2.0 | |
Red Hat JBoss Enterprise Web Platform | =5.1.2 | |
Red Hat JBoss Enterprise Web Platform | =5.2.0 | |
Red Hat JBoss Enterprise BRMS Platform | <=5.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0034 is considered a moderate vulnerability due to the potential exposure of sensitive credentials.
To fix CVE-2012-0034, upgrade to Red Hat JBoss Enterprise Application Platform or JBoss Enterprise Web Platform version 5.3.0 or later.
CVE-2012-0034 affects Red Hat JBoss Enterprise Application Platform versions 5.1.2 and 5.2.0 and Red Hat JBoss Enterprise Web Platform versions 5.1.2 and 5.2.0.
Yes, a local attacker with access to the log files can exploit CVE-2012-0034 to read the username and password in cleartext.
When an exception occurs in CVE-2012-0034, the NonManagedConnectionFactory logs the username and password in cleartext, creating a security risk.