First published: Tue Mar 12 2013(Updated: )
The default configuration of the (1) LdapLoginModule and (2) LdapExtLoginModule modules in JBoss Enterprise Application Platform (EAP) 4.3.0 CP10, 5.2.0, and 6.0.1, and Enterprise Web Platform (EWP) 5.2.0 allow remote attackers to bypass authentication via an empty password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =4.3.0 | |
JBoss Enterprise Application Platform | =5.2.0 | |
JBoss Enterprise Application Platform | =6.0.1 | |
Red Hat JBoss Enterprise Web Platform | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5629 has a medium severity rating due to its potential to allow remote attackers to bypass authentication.
To fix CVE-2012-5629, update your JBoss Enterprise Application Platform or Enterprise Web Platform to a patched version that addresses this vulnerability.
CVE-2012-5629 affects JBoss Enterprise Application Platform versions 4.3.0, 5.2.0, 6.0.1, and JBoss Enterprise Web Platform version 5.2.0.
Yes, CVE-2012-5629 can be exploited by remote attackers who can bypass authentication with an empty password.
CVE-2012-5629 involves the LdapLoginModule and LdapExtLoginModule components in JBoss.