Vulnerabilities > CVE-2014-0058 - Cryptographic Issues vulnerability in Redhat Jboss Enterprise Application Platform
Attack vector
LOCAL Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | Red Hat Local Security Checks |
NASL id | REDHAT-RHSA-2014-0204.NASL |
description | Updated Red Hat JBoss Enterprise Application Platform 6.2.1 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the security audit functionality, as provided by Red Hat JBoss Enterprise Application Platform 6, logged request parameters in plain text. This may have caused passwords to be included in the audit log files when using BASIC or FORM-based authentication. A local attacker with access to audit log files could possibly use this flaw to obtain application or server authentication credentials. (CVE-2014-0058) The provided patch to fix CVE-2014-0058 also allows greater control over which of the following components of web requests are captured in audit logs : * parameters * cookies * headers * attributes It is also possible to selectively mask some elements of headers, parameters, cookies, and attributes using masks. This capability is provided by two system properties, which are introduced by this patch : 1) org.jboss.security.web.audit Description: This property controls the granularity of the security auditing of web requests. Possible values: off = Disables auditing of web requests headers = Audits only the headers of web requests cookies = Audits only the cookies of web requests parameters = Audits only the parameters of web requests attributes = Audits only the attributes of web requests headers,cookies,parameters = Audits the headers, cookies, and parameters of web requests headers,cookies = Audits the headers and cookies of web requests Default Value: headers, parameters Examples: Setting |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 72678 |
published | 2014-02-25 |
reporter | This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/72678 |
title | RHEL 5 / 6 : JBoss EAP (RHSA-2014:0204) |
code |
|
Redhat
advisories |
| ||||||||||||
rpms |
|
Seebug
bulletinFamily | exploit |
description | Bugtraq ID:65762 CVE ID:CVE-2014-0058 JBOSS是一个基于J2EE的开放源代码的应用服务器。 JBoss Enterprise Application Platform的安全审核功能会以明文方式记录请求参数,当使用BASIC或者基于FORM的验证时会记录敏感信息,可访问日志文件的攻击者可获取敏感信息。 0 JBoss Enterprise Application Platform 6.2.1 厂商补丁: JBOSS ----- 用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: https://rhn.redhat.com/errata/RHSA-2014-0205.html |
id | SSV:61588 |
last seen | 2017-11-19 |
modified | 2014-02-27 |
published | 2014-02-27 |
reporter | Root |
title | JBoss Enterprise Application Platform明文密码本地信息泄漏漏洞 |