First published: Thu Feb 20 2014(Updated: )
Graeme Colman of Red Hat reported a sensitive data exposure flaw in Apache Zookeeper. An admin user's password appeared in plaintext in binary log files. A local user could read this information and use it to gain administrative access to the application. Update 2018-08-06: JBoss Fuse did not enable encrypted passwords by default in its usage of Apache Zookeeper. This permitted sensitive information disclosure via logging to local users. This issue is a vulnerability in JBoss Fuse's usage of Apache Zookeeper, not in Zookeeper itself as was previously stated.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fuse | ||
Apache ZooKeeper |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1067265 is critical due to sensitive data exposure that allows unauthorized access to admin credentials.
To fix REDHAT-BUG-1067265, you should update to the latest version of Apache Zookeeper or Red Hat JBoss Fuse that addresses this vulnerability.
REDHAT-BUG-1067265 is classified as a sensitive data exposure vulnerability, specifically exposing admin user passwords in plaintext.
REDHAT-BUG-1067265 was reported by Graeme Colman of Red Hat.
REDHAT-BUG-1067265 allows local users to read admin passwords from binary log files, potentially leading to unauthorized administrative access.