CVE-2009-3554

Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
References
Link Resource
http://secunia.com/advisories/37671 Vendor Advisory
http://securitytracker.com/id?1023316
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html Patch Vendor Advisory
http://www.securityfocus.com/bid/37276
https://bugzilla.redhat.com/show_bug.cgi?id=532111
https://bugzilla.redhat.com/show_bug.cgi?id=539495 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/54702
https://jira.jboss.org/jira/browse/JBPAPP-2872
https://rhn.redhat.com/errata/RHSA-2009-1636.html Vendor Advisory
https://rhn.redhat.com/errata/RHSA-2009-1637.html Vendor Advisory
https://rhn.redhat.com/errata/RHSA-2009-1649.html Vendor Advisory
https://rhn.redhat.com/errata/RHSA-2009-1650.html Vendor Advisory
http://secunia.com/advisories/37671 Vendor Advisory
http://securitytracker.com/id?1023316
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html Patch Vendor Advisory
http://www.securityfocus.com/bid/37276
https://bugzilla.redhat.com/show_bug.cgi?id=532111
https://bugzilla.redhat.com/show_bug.cgi?id=539495 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/54702
https://jira.jboss.org/jira/browse/JBPAPP-2872
https://rhn.redhat.com/errata/RHSA-2009-1636.html Vendor Advisory
https://rhn.redhat.com/errata/RHSA-2009-1637.html Vendor Advisory
https://rhn.redhat.com/errata/RHSA-2009-1649.html Vendor Advisory
https://rhn.redhat.com/errata/RHSA-2009-1650.html Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2:cp01:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2:cp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp01:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp03:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp04:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp05:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp06:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp07:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.2:ga:*:*:*:*:*:*

History

No history.

Information

Published : 2009-12-15 18:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-3554

Mitre link : CVE-2009-3554

CVE.ORG link : CVE-2009-3554


JSON object : View

Products Affected

redhat

  • jboss_enterprise_application_platform
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor