CVE-2009-3554Sensitive Information Exposure in Redhat Jboss Enterprise Application Platform

Severity
2.1LOWNVD
EPSS
0.1%
top 79.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 15
Latest updateMay 2

Description

Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.

CVSS vector

AV:L/AC:L/C:P/I:N/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-p46q-pmw2-55mw: Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 42022-05-02
CVEList
CVE-2009-3554: Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 42009-12-15

📋Vendor Advisories

1
Red Hat
JBoss EAP Twiddle logs the JMX password2009-10-02

💬Community

1
Bugzilla
CVE-2009-3554 JBoss EAP Twiddle logs the JMX password2009-11-20
CVE-2009-3554 — Sensitive Information Exposure | cvebase