Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/37276 | vdb entry |
https://jira.jboss.org/jira/browse/JBPAPP-2872 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54702 | vdb entry |
https://rhn.redhat.com/errata/RHSA-2009-1637.html | vendor advisory |
http://secunia.com/advisories/37671 | third party advisory vendor advisory |
https://rhn.redhat.com/errata/RHSA-2009-1636.html | vendor advisory |
https://rhn.redhat.com/errata/RHSA-2009-1649.html | vendor advisory |
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html | patch vendor advisory |
http://securitytracker.com/id?1023316 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=539495 | patch |
https://bugzilla.redhat.com/show_bug.cgi?id=532111 | |
https://rhn.redhat.com/errata/RHSA-2009-1650.html | vendor advisory |