Bug 1002853 (CVE-2013-4293)

Summary: CVE-2013-4293 JON Server: Plaintext passwords in server logs
Product: [Other] Security Response Reporter: Arun Babu Neelicattu <aneelica>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: grocha, hrupp, security-response-team, spinder, theute
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=low,public=20131021,reported=20130829,source=redhat,cvss2=2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N,jon-3.1/Core Server=affected
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-10-21 14:12:36 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Bug Depends On: 1002255, 1004730, 1007220    
Bug Blocks: 1002836    

Description Arun Babu Neelicattu 2013-08-30 02:32:47 EDT
The JBoss Operations Network Server exposes configured passwords in plaintext within its logs by default. A malicious local user with access to these logs could use the exposed credentials.
Comment 3 Vincent Danen 2013-10-21 13:00:48 EDT
Acknowledgements:

This issue was discovered by Larry O'Leary of the Red Hat Middleware Support Engineering Group.
Comment 4 errata-xmlrpc 2013-10-21 13:31:29 EDT
This issue has been addressed in following products:

  Red Hat JBoss Operations Network 3.1.2

Via RHSA-2013:1448 https://rhn.redhat.com/errata/RHSA-2013-1448.html