It was found that the security audit functionality logged request parameters in plain text. This may have caused passwords to be included in the audit log files when using BASIC or FORM-based authentication. A local attacker with access to audit log files could possibly use this flaw to obtain application or server authentication credentials.
Find out more about CVE-2014-0058 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 1.9 |
---|---|
Base Metrics | AV:L/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server (jboss-as-web) | RHSA-2014:0204 | 2014-02-24 |
Red Hat JBoss Enterprise Application Platform 6 for RHEL 5 Server (jboss-as-web) | RHSA-2014:0204 | 2014-02-24 |
Red Hat JBoss Operations Network 3.2 | RHSA-2014:0910 | 2014-07-21 |
Platform | Package | State |
---|---|---|
Red Hat JBoss Portal Platform 6 | eap | Will not fix |
Red Hat JBoss Fuse Service Works 6 | eap | Will not fix |
Red Hat JBoss EAP 6 | audit | Will not fix |
Red Hat JBoss EAP 5 | audit | Not affected |
Red Hat JBoss Data Virtualization 6 | eap | Will not fix |
Red Hat JBoss Data Grid 6 | eap | Will not fix |
Red Hat JBoss BRMS 6 | eap | Will not fix |
Red Hat JBoss BPMS 6 | eap | Will not fix |