First published: Wed Jan 23 2013(Updated: )
The JBoss EAP/EWP 5.2.0 GUI installer can generate an auto-install XML file that contains the admin/sucker password in plain text. This file when saved on disk is set as being world-readable. This means any local user can view the password which could then be used to gain administrator access to an EAP/EWP instance.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | ||
Red Hat JBoss Enterprise Web Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-903073 is considered critical due to the exposure of the admin password in plain text.
To fix REDHAT-BUG-903073, ensure that the auto-install XML file is not saved with world-readable permissions and consider using a more secure password management approach.
Users of Red Hat JBoss EAP and JBoss EWP version 5.2.0 are affected by REDHAT-BUG-903073.
The potential impacts of REDHAT-BUG-903073 include unauthorized access to the application server using the exposed administrator password.
Yes, a patch for REDHAT-BUG-903073 is available from Red Hat to address the vulnerability.