First published: Fri Aug 30 2013(Updated: )
The JBoss Operations Network Server exposes configured passwords in plaintext within its logs by default. A malicious local user with access to these logs could use the exposed credentials.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Operations Network | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4293 is classified as a moderate severity vulnerability due to the potential exposure of plaintext passwords in logs.
To mitigate CVE-2013-4293, ensure that logging configurations are adjusted to avoid logging sensitive information like passwords.
CVE-2013-4293 affects users of Red Hat JBoss Operations Network version 3.1.2.
CVE-2013-4293 allows local users with access to logs to retrieve plaintext passwords, which could lead to unauthorized access.
Yes, patches are available and recommended to prevent the logging of plaintext passwords for CVE-2013-4293.