Vulnerability Name: CVE-2009-3554 (CCN-54702) Assigned: 2009-12-09 Published: 2009-12-09 Updated: 2017-08-17 Summary: Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file. CVSS v3 Severity: 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N )1.6 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N )1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-200 Vulnerability Consequences: Obtain Information References: Source: MITRE Type: CNACVE-2009-3554 Source: CCN Type: RHSA-2009-1636Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update Source: CCN Type: RHSA-2009-1637Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update Source: CCN Type: RHSA-2009-1649Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update Source: CCN Type: RHSA-2009-1650Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update Source: SECUNIA Type: Vendor Advisory37671 Source: CCN Type: SA54255HP Network Node Manager i (NNMi) Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1023316JBoss Enterprise Application Platform Discloses JMX Password to Local Users Source: SECTRACK Type: UNKNOWN1023316 Source: CCN Type: JBoss Web siteJBoss Enterprise Application Platform Source: CCN Type: OSVDB ID: 61060JBoss Enterprise Application Platform Twiddle JMX Password twiddle.log Local Information Disclosure Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html Source: BID Type: UNKNOWN37276 Source: CCN Type: BID-37276JBoss Enterprise Application Platform Multiple Vulnerabilities Source: CONFIRM Type: UNKNOWNhttps://bugzilla.redhat.com/show_bug.cgi?id=532111 Source: CONFIRM Type: Patchhttps://bugzilla.redhat.com/show_bug.cgi?id=539495 Source: CCN Type: Red Hat Bugzilla Bug 539495CVE-2009-3554 JBoss EAP Twiddle logs the JMX password Source: XF Type: UNKNOWNjbosseap-twiddle-jmx-info-disclosure(54702) Source: XF Type: UNKNOWNjbosseap-twiddle-jmx-info-disclosure(54702) Source: CCN Type: HP Security Bulletin HPSBMU02894 rev.1HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Denial of Service (DoS), Unauthorized Access, Execution of Arbitrary Code Source: CONFIRM Type: UNKNOWNhttps://jira.jboss.org/jira/browse/JBPAPP-2872 Source: REDHAT Type: Vendor AdvisoryRHSA-2009:1636 Source: REDHAT Type: Vendor AdvisoryRHSA-2009:1637 Source: REDHAT Type: Vendor AdvisoryRHSA-2009:1649 Source: REDHAT Type: Vendor AdvisoryRHSA-2009:1650 Vulnerable Configuration: Configuration 1 :cpe:/a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2:cp01:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2:cp02:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp01:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp02:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp03:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp04:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp05:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp06:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp07:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.2:ga:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:4.3:*:*:*:*:*:*:* AND cpe:/a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
redhat jboss enterprise application platform 4.2
redhat jboss enterprise application platform 4.2 cp01
redhat jboss enterprise application platform 4.2 cp02
redhat jboss enterprise application platform 4.2.0 cp01
redhat jboss enterprise application platform 4.2.0 cp02
redhat jboss enterprise application platform 4.2.0 cp03
redhat jboss enterprise application platform 4.2.0 cp04
redhat jboss enterprise application platform 4.2.0 cp05
redhat jboss enterprise application platform 4.2.0 cp06
redhat jboss enterprise application platform 4.2.0 cp07
redhat jboss enterprise application platform 4.2.2 ga
redhat jboss enterprise application platform 4.2
redhat jboss enterprise application platform 4.3
hp network node manager i 9.0