1.9
CVSSv2

CVE-2014-0058

Published: 26/02/2014 Updated: 07/01/2017
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x prior to 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat jboss enterprise application platform 6.0.0

redhat jboss enterprise application platform 6.0.1

redhat jboss enterprise application platform 6.1.0

redhat jboss enterprise application platform 6.2.0

Vendor Advisories

It was found that the security audit functionality logged request parameters in plain text This may have caused passwords to be included in the audit log files when using BASIC or FORM-based authentication A local attacker with access to audit log files could possibly use this flaw to obtain application or server authentication credentials ...