ID CVE-2013-4293
Summary The server in Red Hat JBoss Operations Network (JON) 3.1.2 logs passwords in plaintext, which allows local users to obtain sensitive information by reading the log files.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:jboss_operations_network:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:jboss_operations_network:3.1.2:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 25-10-2013 - 14:33)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
redhat via4
advisories
rhsa
id RHSA-2013:1448
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=1002853
Last major update 25-10-2013 - 14:33
Published 24-10-2013 - 03:48
Last modified 25-10-2013 - 14:33
Back to Top