First published: Fri Jun 07 2013(Updated: )
** DISPUTED ** The Embedded Jopr component in JBoss Application Server includes the cleartext datasource password in unspecified HTML responses, which might allow (1) man-in-the-middle attackers to obtain sensitive information by leveraging failure to use SSL or (2) attackers to obtain sensitive information by reading the HTML source code. NOTE: the vendor says that this does not cross a trust boundary and that it is recommended best-practice that SSL is configured for the administrative console.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Application Server | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3734 is considered a high severity vulnerability due to the exposure of sensitive information.
To fix CVE-2013-3734, you should upgrade to a version of JBoss Application Server that no longer includes cleartext passwords in HTML responses.
CVE-2013-3734 can be exploited by man-in-the-middle attackers who intercept unencrypted traffic and obtain sensitive information.
CVE-2013-3734 affects all versions of JBoss Application Server up to and including 1.2.
CVE-2013-3734 exposes the datasource password in cleartext, which can lead to unauthorized access.