Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-11980

Опубликовано: 12 июн. 2020
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's possible to authenticate as a viewer role + invokes on the MLet getMBeansFromURL method, which goes off to a remote server to fetch the desired MBean, which is then registered in Karaf. At this point the attack fails as "viewer" doesn't have the permission to invoke on the MBean. Still, it could act as a SSRF style attack and also it essentially allows a "viewer" role to pollute the MBean registry, which is a kind of privilege escalation. The vulnerability is low as it's possible to add a ACL to limit access. Users should update to Apache Karaf 4.2.9 or newer.

Меры по смягчению последствий

It's possible to add a JMX ACL in etc configuration to limit access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7KarafNot affected
Red Hat Integration Camel K 1KarafNot affected
Red Hat OpenStack Platform 10 (Newton)opendaylightOut of support scope
Red Hat OpenStack Platform 13 (Queens)opendaylightWill not fix
Red Hat Process Automation 7KarafNot affected
Red Hat Fuse 7.8.0KarafFixedRHSA-2020:556816.12.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=1850450karaf: A remote client could create MBeans from arbitrary URLs

EPSS

Процентиль: 66%
0.00514
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 6.3
nvd
больше 5 лет назад

In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's possible to authenticate as a viewer role + invokes on the MLet getMBeansFromURL method, which goes off to a remote server to fetch the desired MBean, which is then registered in Karaf. At this point the attack fails as "viewer" doesn't have the permission to invoke on the MBean. Still, it could act as a SSRF style attack and also it essentially allows a "viewer" role to pollute the MBean registry, which is a kind of privilege escalation. The vulnerability is low as it's possible to add a ACL to limit access. Users should update to Apache Karaf 4.2.9 or newer.

CVSS3: 6.3
debian
больше 5 лет назад

In Karaf, JMX authentication takes place using JAAS and authorization ...

CVSS3: 6.3
github
почти 4 года назад

Server-Side Request Forgery in Karaf

EPSS

Процентиль: 66%
0.00514
Низкий

8.8 High

CVSS3