CVE-2013-3734

The Embedded Jopr component in JBoss Application Server includes the cleartext datasource password in unspecified HTML responses, which might allow (1) man-in-the-middle attackers to obtain sensitive information by leveraging failure to use SSL or (2) attackers to obtain sensitive information by reading the HTML source code. NOTE: the vendor says that this does not cross a trust boundary and that it is recommended best-practice that SSL is configured for the administrative console
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:jboss_application_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:54

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/60429 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/60429 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=971637 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=971637 - Issue Tracking, Vendor Advisory
References () https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/ - Issue Tracking, Third Party Advisory () https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/ - Issue Tracking, Third Party Advisory

07 Nov 2023, 02:16

Type Values Removed Values Added
Summary ** DISPUTED ** The Embedded Jopr component in JBoss Application Server includes the cleartext datasource password in unspecified HTML responses, which might allow (1) man-in-the-middle attackers to obtain sensitive information by leveraging failure to use SSL or (2) attackers to obtain sensitive information by reading the HTML source code. NOTE: the vendor says that this does not cross a trust boundary and that it is recommended best-practice that SSL is configured for the administrative console. The Embedded Jopr component in JBoss Application Server includes the cleartext datasource password in unspecified HTML responses, which might allow (1) man-in-the-middle attackers to obtain sensitive information by leveraging failure to use SSL or (2) attackers to obtain sensitive information by reading the HTML source code. NOTE: the vendor says that this does not cross a trust boundary and that it is recommended best-practice that SSL is configured for the administrative console

Information

Published : 2017-10-24 15:29

Updated : 2024-11-21 01:54


NVD link : CVE-2013-3734

Mitre link : CVE-2013-3734

CVE.ORG link : CVE-2013-3734


JSON object : View

Products Affected

redhat

  • jboss_application_server
CWE
CWE-255

Credentials Management Errors