Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-0738

Опубликовано: 26 апр. 2010
Источник: redhat
CVSS2: 7.5
EPSS Критический

Описание

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=574105JBoss EAP jmx authentication bypass with crafted HTTP request

EPSS

Процентиль: 100%
0.91288
Критический

7.5 High

CVSS2

Связанные уязвимости

CVSS3: 5.3
nvd
почти 16 лет назад

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

CVSS3: 5.3
debian
почти 16 лет назад

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise ...

CVSS3: 5.3
github
почти 4 года назад

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

CVSS3: 5.3
fstec
почти 16 лет назад

Уязвимость веб-приложения JMX-Console платформы JBoss Enterprise Application Platform, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 100%
0.91288
Критический

7.5 High

CVSS2