First published: Tue Feb 25 2014(Updated: )
The account-creation functionality in IBM Rational Focal Point 6.4.x and 6.5.x before 6.5.2.3 and 6.6.x before 6.6.1 places the new user's default password within the creation page, which allows remote attackers to obtain sensitive information by reading the HTML source code.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational Focal Point | =6.4 | |
IBM Rational Focal Point | =6.4.0.1 | |
IBM Rational Focal Point | =6.4.1.0 | |
IBM Rational Focal Point | =6.4.1.1 | |
IBM Rational Focal Point | =6.4.1.2 | |
IBM Rational Focal Point | =6.4.1.3 | |
IBM Rational Focal Point | =6.5 | |
IBM Rational Focal Point | =6.5.0.1 | |
IBM Rational Focal Point | =6.5.0.2 | |
IBM Rational Focal Point | =6.5.1 | |
IBM Rational Focal Point | =6.5.1.1 | |
IBM Rational Focal Point | =6.5.2 | |
IBM Rational Focal Point | =6.5.2.1 | |
IBM Rational Focal Point | =6.5.2.2 | |
IBM Rational Focal Point | =6.5.2.3 | |
IBM Rational Focal Point | =6.6 | |
IBM Rational Focal Point | =6.6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0842 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2014-0842, upgrade to IBM Rational Focal Point version 6.5.2.3 or 6.6.1 to eliminate the vulnerability.
CVE-2014-0842 affects IBM Rational Focal Point versions 6.4.x, 6.5.x before 6.5.2.3, and 6.6.x before 6.6.1.
CVE-2014-0842 can expose new users' default passwords through the visible HTML source code.
Yes, CVE-2014-0842 allows remote attackers to read sensitive information from the HTML source code.