Vulnerability Description
The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Jboss Enterprise Application Platform | 6.0.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2014-0204.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0205.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0034.htmlVendor Advisory
- http://www.securityfocus.com/bid/65762
- http://rhn.redhat.com/errata/RHSA-2014-0204.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0205.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0034.htmlVendor Advisory
- http://www.securityfocus.com/bid/65762
FAQ
What is CVE-2014-0058?
CVE-2014-0058 is a vulnerability with a CVSS score of 1.9 (LOW). The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by read...
How severe is CVE-2014-0058?
CVE-2014-0058 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0058?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Jboss Enterprise Application Platform.