Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1297

Опубликовано: 13 фев. 2018
Источник: debian
EPSS Средний

Описание

When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jakarta-jmeterunfixedpackage
jakarta-jmeterignoredtrixiepackage
jakarta-jmeterignoredbookwormpackage
jakarta-jmeterignoredbullseyepackage
jakarta-jmeterignoredbusterpackage
jakarta-jmeterignoredstretchpackage
jakarta-jmeterignoredjessiepackage
jakarta-jmeterno-dsawheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2018/02/11/1

  • https://bz.apache.org/bugzilla/show_bug.cgi?id=62039

  • https://github.com/apache/jmeter/issues/4677

EPSS

Процентиль: 96%
0.23187
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 8 лет назад

When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.

CVSS3: 9.8
nvd
почти 8 лет назад

When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.

CVSS3: 9.8
github
больше 3 лет назад

Missing certificate validation in Apache JMeter

EPSS

Процентиль: 96%
0.23187
Средний