Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-24c5-hsys-7bbw
Vulnerability ID VCID-24c5-hsys-7bbw
Aliases CVE-2024-1102
GHSA-9wmf-xf3h-r8pr
Summary Jberet: jberet-core logging database credentials A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2024:1677
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2024:1677
ssvc Track https://access.redhat.com/errata/RHSA-2024:1677
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2024:3580
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2024:3580
ssvc Track https://access.redhat.com/errata/RHSA-2024:3580
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2024:3581
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2024:3581
ssvc Track https://access.redhat.com/errata/RHSA-2024:3581
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2024:3583
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2024:3583
ssvc Track https://access.redhat.com/errata/RHSA-2024:3583
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1102.json
cvssv3.1 6.5 https://access.redhat.com/security/cve/CVE-2024-1102
generic_textual MODERATE https://access.redhat.com/security/cve/CVE-2024-1102
ssvc Track https://access.redhat.com/security/cve/CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1102
cvssv3.1 6.5 https://bugzilla.redhat.com/show_bug.cgi?id=2262060
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=2262060
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2262060
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-9wmf-xf3h-r8pr
cvssv3.1 6.5 https://github.com/jberet/jsr352
generic_textual MODERATE https://github.com/jberet/jsr352
cvssv3.1 6.5 https://github.com/jberet/jsr352/commit/eeef999663d7da0e372aeeeac26ecf7201a3121d
generic_textual MODERATE https://github.com/jberet/jsr352/commit/eeef999663d7da0e372aeeeac26ecf7201a3121d
cvssv3.1 6.5 https://github.com/jberet/jsr352/issues/452
generic_textual MODERATE https://github.com/jberet/jsr352/issues/452
ssvc Track https://github.com/jberet/jsr352/issues/452
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2024-1102
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-1102
Reference id Reference type URL
https://access.redhat.com/errata/RHSA-2024:1677
https://access.redhat.com/errata/RHSA-2024:3580
https://access.redhat.com/errata/RHSA-2024:3581
https://access.redhat.com/errata/RHSA-2024:3583
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1102.json
https://access.redhat.com/security/cve/CVE-2024-1102
https://api.first.org/data/v1/epss?cve=CVE-2024-1102
https://bugzilla.redhat.com/show_bug.cgi?id=2262060
https://github.com/jberet/jsr352
https://github.com/jberet/jsr352/commit/eeef999663d7da0e372aeeeac26ecf7201a3121d
https://github.com/jberet/jsr352/issues/452
https://nvd.nist.gov/vuln/detail/CVE-2024-1102
cpe:/a:redhat:build_keycloak: https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:
cpe:/a:redhat:jboss_data_grid:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_data_grid:7
cpe:/a:redhat:jboss_data_grid:8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_data_grid:8
cpe:/a:redhat:jbosseapxp https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jbosseapxp
cpe:/a:redhat:jboss_enterprise_application_platform:6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:6
cpe:/a:redhat:jboss_enterprise_application_platform:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:7
cpe:/a:redhat:jboss_enterprise_application_platform:7.4 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:7.4
cpe:/a:redhat:jboss_enterprise_application_platform:8.0 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:8.0
cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
cpe:/a:redhat:jboss_fuse:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_fuse:7
cpe:/a:redhat:red_hat_single_sign_on:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7
GHSA-9wmf-xf3h-r8pr https://github.com/advisories/GHSA-9wmf-xf3h-r8pr
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:1677
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:44:29Z/ Found at https://access.redhat.com/errata/RHSA-2024:1677
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3580
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:44:29Z/ Found at https://access.redhat.com/errata/RHSA-2024:3580
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3581
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:44:29Z/ Found at https://access.redhat.com/errata/RHSA-2024:3581
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3583
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:44:29Z/ Found at https://access.redhat.com/errata/RHSA-2024:3583
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1102.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/security/cve/CVE-2024-1102
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:44:29Z/ Found at https://access.redhat.com/security/cve/CVE-2024-1102
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2262060
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:44:29Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2262060
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/jberet/jsr352
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/jberet/jsr352/commit/eeef999663d7da0e372aeeeac26ecf7201a3121d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/jberet/jsr352/issues/452
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:44:29Z/ Found at https://github.com/jberet/jsr352/issues/452
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-1102
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.26242
EPSS Score 0.00093
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:49:37.898705+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-9wmf-xf3h-r8pr/GHSA-9wmf-xf3h-r8pr.json 38.0.0