First published: Tue Feb 11 2014(Updated: )
It was identified that web auditing, as provided by Red Hat JBoss Enterprise Application Platform 6, logged request parameters in plain text. This may include passwords used for authentication mechanisms such as BASIC and FORMAUTH. A local attacker, with access to audit logs, could compromise application/server credentials.
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1063641 is considered high due to the potential exposure of sensitive information like passwords in plain text.
To fix REDHAT-BUG-1063641, it's recommended to upgrade to a version of Red Hat JBoss Enterprise Application Platform that addresses the issue.
The risks associated with REDHAT-BUG-1063641 include unauthorized access to sensitive data logged in plain text, which could lead to further exploitation.
No, REDHAT-BUG-1063641 requires local access to the audit logs to exploit the vulnerability.
REDHAT-BUG-1063641 affects the Red Hat JBoss Enterprise Application Platform 6, particularly its web auditing feature.