First published: Wed Jan 23 2013(Updated: )
The GUI installer in JBoss Enterprise Application Platform (EAP) and Enterprise Web Platform (EWP) 5.2.0 and possibly 5.1.2 uses world-readable permissions for the auto-install XML file, which allows local users to obtain the administrator password and the sucker password by reading this file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat jboss enterprise application platform | =5.1.2 | |
redhat jboss enterprise application platform | =5.2.0 | |
Red Hat JBoss Enterprise Web Platform | =5.1.2 | |
Red Hat JBoss Enterprise Web Platform | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0218 is classified as a moderate severity vulnerability.
To fix CVE-2013-0218, you should restrict the permissions of the auto-install XML file to prevent unauthorized access.
CVE-2013-0218 affects JBoss Enterprise Application Platform versions 5.1.2 and 5.2.0, as well as JBoss Enterprise Web Platform versions 5.1.2 and 5.2.0.
CVE-2013-0218 can be exploited by local users who gain access to the world-readable auto-install XML file.
CVE-2013-0218 exposes the administrator password and sucker password contained in the auto-install XML file.