{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-02-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"The NonManagedConnectionFactory in JBoss Enterprise Application Platform (EAP) 5.1.2 and 5.2.0, Web Platform (EWP) 5.1.2 and 5.2.0, and BRMS Platform before 5.3.1 logs the username and password in cleartext when an exception is thrown, which allows local users to obtain sensitive information by reading the log file."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2015-01-13T17:57:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"78259","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/78259"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=772835"},{"name":"RHSA-2013:0192","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0192.html"},{"name":"RHSA-2013:0195","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0195.html"},{"name":"RHSA-2013:0221","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0221.html"},{"name":"RHSA-2013:0196","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0196.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.jboss.org/browse/JBCACHE-1612"},{"name":"51392","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/51392"},{"name":"RHSA-2012:1072","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1072.html"},{"name":"RHSA-2013:0193","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0193.html"},{"name":"RHSA-2012:0108","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0108.html"},{"name":"51984","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/51984"},{"name":"52054","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/52054"},{"name":"RHSA-2013:0191","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0191.html"},{"name":"RHSA-2013:0533","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0533.html"},{"name":"RHSA-2013:0197","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0197.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T18:09:17.244Z"},"title":"CVE Program Container","references":[{"name":"78259","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/78259"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=772835"},{"name":"RHSA-2013:0192","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0192.html"},{"name":"RHSA-2013:0195","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0195.html"},{"name":"RHSA-2013:0221","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0221.html"},{"name":"RHSA-2013:0196","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0196.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.jboss.org/browse/JBCACHE-1612"},{"name":"51392","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/51392"},{"name":"RHSA-2012:1072","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1072.html"},{"name":"RHSA-2013:0193","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0193.html"},{"name":"RHSA-2012:0108","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0108.html"},{"name":"51984","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/51984"},{"name":"52054","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/52054"},{"name":"RHSA-2013:0191","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0191.html"},{"name":"RHSA-2013:0533","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0533.html"},{"name":"RHSA-2013:0197","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0197.html"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2012-0034","datePublished":"2013-02-05T23:11:00.000Z","dateReserved":"2011-12-07T00:00:00.000Z","dateUpdated":"2024-08-06T18:09:17.244Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}