CVE-2005-4849: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
Apache Derby before 10.1.2.1 exposes the (1) user and (2) password attributes in cleartext via (a) the RDBNAM parameter of the ACCSEC command and (b) the output of the DatabaseMetaData.getURL function, which allows context-dependent attackers to obtain sensitive information.
References
- db.apache.org/derby/releases/release-10.1.2.1.html
- issues.apache.org/jira/browse/DERBY-530
- issues.apache.org/jira/browse/DERBY-559
- svn.apache.org/viewvc?view=revision&revision=289672
- github.com/advisories/GHSA-rp7r-79rm-2758
- github.com/apache/derby/commit/09a7325f75a4f96a7735e46c9723930f88ea2613
- github.com/apache/derby/commit/82d721fd53e30dbb86d6d742c085030985091968
- github.com/apache/derby/commit/fd24a7590ff5426bac68303fbeca07dbc5067412
- nvd.nist.gov/vuln/detail/CVE-2005-4849
Detect and mitigate CVE-2005-4849 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →