First published: Tue Feb 11 2014(Updated: )
It was identified that web auditing, as provided by Red Hat JBoss Enterprise Application Platform 6, logged request parameters in plain text. This may include passwords used for authentication mechanisms such as BASIC and FORMAUTH. A local attacker, with access to audit logs, could compromise application/server credentials.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | =6.0.0 | |
Red Hat JBoss Enterprise Application Platform | =6.0.1 | |
Red Hat JBoss Enterprise Application Platform | =6.1.0 | |
Red Hat JBoss Enterprise Application Platform | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0058 is considered a medium severity vulnerability due to the potential exposure of sensitive data in audit logs.
To fix CVE-2014-0058, upgrade to a patched version of Red Hat JBoss Enterprise Application Platform that addresses the logging of sensitive request parameters.
CVE-2014-0058 affects Red Hat JBoss Enterprise Application Platform versions 6.0.0, 6.0.1, 6.1.0, and 6.2.0.
CVE-2014-0058 could result in the exposure of sensitive data, including passwords used for authentication mechanisms.
A local attacker with access to the audit logs could exploit CVE-2014-0058 to compromise application accounts.