Vulnerability Name:

CVE-2009-3554 (CCN-54702)

Assigned:2009-12-09
Published:2009-12-09
Updated:2017-08-17
Summary:Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2009-3554

Source: CCN
Type: RHSA-2009-1636
Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update

Source: CCN
Type: RHSA-2009-1637
Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update

Source: CCN
Type: RHSA-2009-1649
Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update

Source: CCN
Type: RHSA-2009-1650
Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update

Source: SECUNIA
Type: Vendor Advisory
37671

Source: CCN
Type: SA54255
HP Network Node Manager i (NNMi) Multiple Vulnerabilities

Source: CCN
Type: SECTRACK ID: 1023316
JBoss Enterprise Application Platform Discloses JMX Password to Local Users

Source: SECTRACK
Type: UNKNOWN
1023316

Source: CCN
Type: JBoss Web site
JBoss Enterprise Application Platform

Source: CCN
Type: OSVDB ID: 61060
JBoss Enterprise Application Platform Twiddle JMX Password twiddle.log Local Information Disclosure

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html

Source: BID
Type: UNKNOWN
37276

Source: CCN
Type: BID-37276
JBoss Enterprise Application Platform Multiple Vulnerabilities

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=532111

Source: CONFIRM
Type: Patch
https://bugzilla.redhat.com/show_bug.cgi?id=539495

Source: CCN
Type: Red Hat Bugzilla Bug 539495
CVE-2009-3554 JBoss EAP Twiddle logs the JMX password

Source: XF
Type: UNKNOWN
jbosseap-twiddle-jmx-info-disclosure(54702)

Source: XF
Type: UNKNOWN
jbosseap-twiddle-jmx-info-disclosure(54702)

Source: CCN
Type: HP Security Bulletin HPSBMU02894 rev.1
HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Denial of Service (DoS), Unauthorized Access, Execution of Arbitrary Code

Source: CONFIRM
Type: UNKNOWN
https://jira.jboss.org/jira/browse/JBPAPP-2872

Source: REDHAT
Type: Vendor Advisory
RHSA-2009:1636

Source: REDHAT
Type: Vendor Advisory
RHSA-2009:1637

Source: REDHAT
Type: Vendor Advisory
RHSA-2009:1649

Source: REDHAT
Type: Vendor Advisory
RHSA-2009:1650

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2:cp01:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2:cp02:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp01:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp02:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp03:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp04:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp05:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp06:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp07:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.2:ga:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.3:*:*:*:*:*:*:*
  • AND
  • cpe:/a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    redhat jboss enterprise application platform 4.2
    redhat jboss enterprise application platform 4.2 cp01
    redhat jboss enterprise application platform 4.2 cp02
    redhat jboss enterprise application platform 4.2.0 cp01
    redhat jboss enterprise application platform 4.2.0 cp02
    redhat jboss enterprise application platform 4.2.0 cp03
    redhat jboss enterprise application platform 4.2.0 cp04
    redhat jboss enterprise application platform 4.2.0 cp05
    redhat jboss enterprise application platform 4.2.0 cp06
    redhat jboss enterprise application platform 4.2.0 cp07
    redhat jboss enterprise application platform 4.2.2 ga
    redhat jboss enterprise application platform 4.2
    redhat jboss enterprise application platform 4.3
    hp network node manager i 9.0