First published: Mon Dec 29 2014(Updated: )
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
HCL AppScan Source | =8.0.0.0 | |
HCL AppScan Source | =8.0.0.1 | |
HCL AppScan Source | =8.0.0.2 | |
HCL AppScan Source | =8.5.0.0 | |
HCL AppScan Source | =8.5.0.1 | |
IBM Security AppScan | =8.6.0.0 | |
IBM Security AppScan | =8.6.0.1 | |
IBM Security AppScan | =8.6.0.2 | |
IBM Security AppScan | =8.7.0.0 | |
IBM Security AppScan | =8.7.0.1 | |
IBM Security AppScan | =8.8 | |
IBM Security AppScan | =9.0 | |
IBM Security AppScan | =9.0.0.0 | |
IBM Security AppScan | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6123 is classified as a moderate severity vulnerability due to the risk of sensitive credential exposure.
To fix CVE-2014-6123, it's recommended to update to the latest version of HCL AppScan Source that addresses this vulnerability.
CVE-2014-6123 affects users of IBM Rational AppScan Source and Security AppScan Source versions specified in the vulnerability details.
CVE-2014-6123 exposes sensitive credential information that can be found in installation logs by local users.
Currently, there is no specific workaround for CVE-2014-6123 besides updating to a patched version of the software.