Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3518

Опубликовано: 16 июл. 2014
Источник: redhat
CVSS2: 7.5
EPSS Низкий

Описание

jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to execute arbitrary code via unspecified vectors.

JBoss Application Server 5 and supported Red Hat JBoss 5.x products contain JBoss Remoting, which includes a partial implementation of the JMX remoting specification JSR 160. This implementation is provided in jmx-remoting.sar, which is deployed by default in unsupported community releases of JBoss Application Server 5.x. This implementation does not implement security as defined in JSR 160, and therefore does not apply any authentication or authorization constraints. A remote attacker could use this flaw to potentially execute arbitrary code on a vulnerable server. All of the supported Red Hat JBoss 5.x products are not affected by this issue in their default configuration. These products are only vulnerable if JMX remoting is enabled by manually deploying jmx-remoting.sar from the jboss-as/docs/examples directory. Unsupported community releases of JBoss Application Server 5.x are affected. All users of the standalone JBoss Remoting project are also affected. For more information, see https://access.redhat.com/solutions/1120423

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 4remotingNot affected
Red Hat JBoss Enterprise Application Platform 6remotingNot affected
Red Hat JBoss Enterprise Web Server 1fuseNot affected
Red Hat JBoss Enterprise Web Server 1othersNot affected
JBoss Enterprise BRMS Platform 5.3remotingFixedRHSA-2014:088716.07.2014
Red Hat JBoss Enterprise Application Platform 5.2remotingFixedRHSA-2014:088716.07.2014
Red Hat JBoss Portal 5.2remotingFixedRHSA-2014:088716.07.2014
Red Hat JBoss SOA Platform 5.3remotingFixedRHSA-2014:088716.07.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-306
https://bugzilla.redhat.com/show_bug.cgi?id=11125455: Remote code execution via unauthenticated JMX/RMI connector

EPSS

Процентиль: 82%
0.01658
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to execute arbitrary code via unspecified vectors.

github
больше 3 лет назад

jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to execute arbitrary code via unspecified vectors.

EPSS

Процентиль: 82%
0.01658
Низкий

7.5 High

CVSS2