Bug 1002853 (CVE-2013-4293)

Summary: CVE-2013-4293 JON Server: Plaintext passwords in server logs
Product: [Other] Security Response Reporter: Arun Babu Neelicattu <aneelica>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: grocha, hrupp, security-response-team, spinder, theute
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-10-21 18:12:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1002255, 1004730, 1007220    
Bug Blocks: 1002836    

Description Arun Babu Neelicattu 2013-08-30 06:32:47 UTC
The JBoss Operations Network Server exposes configured passwords in plaintext within its logs by default. A malicious local user with access to these logs could use the exposed credentials.

Comment 3 Vincent Danen 2013-10-21 17:00:48 UTC
Acknowledgements:

This issue was discovered by Larry O'Leary of the Red Hat Middleware Support Engineering Group.

Comment 4 errata-xmlrpc 2013-10-21 17:31:29 UTC
This issue has been addressed in following products:

  Red Hat JBoss Operations Network 3.1.2

Via RHSA-2013:1448 https://rhn.redhat.com/errata/RHSA-2013-1448.html