CVE-2013-3734

** DISPUTED ** The Embedded Jopr component in JBoss Application Server includes the cleartext datasource password in unspecified HTML responses, which might allow (1) man-in-the-middle attackers to obtain sensitive information by leveraging failure to use SSL or (2) attackers to obtain sensitive information by reading the HTML source code. NOTE: the vendor says that this does not cross a trust boundary and that it is recommended best-practice that SSL is configured for the administrative console.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:jboss_application_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:54

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/60429 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/60429 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=971637 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=971637 - Issue Tracking, Vendor Advisory
References () https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/ - Issue Tracking, Third Party Advisory () https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/ - Issue Tracking, Third Party Advisory

Information

Published : 2017-10-24 15:29

Updated : 2024-11-21 01:54


NVD link : CVE-2013-3734

Mitre link : CVE-2013-3734

CVE.ORG link : CVE-2013-3734


JSON object : View

Products Affected

redhat

  • jboss_application_server
CWE
CWE-255

Credentials Management Errors