Bug 1021756 (CVE-2013-4452)

Summary: CVE-2013-4452 JBoss ON: World readable configuration files expose sensitive data
Product: [Other] Security Response Reporter: Arun Babu Neelicattu <aneelica>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: asantos, ccrouch, djorm, grocha, hfnukal, hrupp, loleary, security-response-team, snegrea, spinder, theute
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-11-25 21:20:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1021759, 1024526, 1025565, 1025566    
Bug Blocks: 1021758    

Description Arun Babu Neelicattu 2013-10-22 02:23:57 UTC
It was identified that the JBoss Operation Network configuration files, for both the server and the agent, were world readable by default. A malicious local user can read sensitive information regarding the installation, which includes various credentials.

Comment 4 Martin Prpič 2013-11-22 10:33:24 UTC
Acknowledgements:

This issue was discovered by Larry O'Leary of the Red Hat Middleware Support Engineering Group.

Comment 5 errata-xmlrpc 2013-11-25 18:52:20 UTC
This issue has been addressed in following products:

   JBoss Operations Network 3.1.2

Via RHSA-2013:1762 https://rhn.redhat.com/errata/RHSA-2013-1762.html