Lucene search

K
githubGitHub Advisory DatabaseGHSA-H259-3RJG-5QP3
HistoryMay 14, 2022 - 2:19 a.m.

Exposure of Sensitive Information to an Unauthorized Actor in JBoss Fuse

2022-05-1402:19:43
CWE-200
GitHub Advisory Database
github.com
10

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

JBoss Fuse did not enable encrypted passwords by default in its usage of Apache Zookeeper. This permitted sensitive information disclosure via logging to local users. Note: this description has been updated; previous text mistakenly identified the source of the flaw as Zookeeper. Previous text: Apache Zookeeper logs cleartext admin passwords, which allows local users to obtain sensitive information by reading the log.

Affected configurations

Vulners
Node
org.jboss.fuse\jbossMatchfuse
CPENameOperatorVersion
org.jboss.fuse:jboss-fuselt6.1.0

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

Related for GHSA-H259-3RJG-5QP3