Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-0738 | First vendor Publication | 2010-04-28 |
Vendor | Cve | Last vendor Modification | 2025-02-07 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N | |||
---|---|---|---|
Overall CVSS Score | 5.3 | ||
Base Score | 5.3 | Environmental Score | 5.3 |
impact SubScore | 1.4 | Temporal Score | 5.3 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | Low | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0738 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
SAINT Exploits
Description | Link |
---|---|
RedHat JBoss Enterprise Application Platform JMX Console Authentication Bypass | More info here |
ExploitDB Exploits
id | Description |
---|---|
2011-10-03 | JBoss, JMX Console, misconfigured DeploymentScanner |
2011-01-10 | JBoss JMX Console Beanshell Deployer WAR upload and deployment |
2010-10-19 | JBoss JMX Console Deployer Upload and Execute |
OpenVAS Exploits
Date | Description |
---|---|
2010-04-28 | Name : JBoss Enterprise Application Platform Multiple Vulnerabilities File : nvt/gb_JBoss_enterprise_aplication_server_39710.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
64171 | JBoss Enterprise Application Platform JMX Console HTTP Request Authentication... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-05-27 | IAVM : 2010-B-0042 - Multiple Vulnerabilities in JBoss Enterprise Application Platform Severity : Category I - VMSKEY : V0024203 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | RedHat JBoss Enterprise Application Platform JMX code execution attempt RuleID : 24642 - Revision : 5 - Type : SERVER-WEBAPP |
2014-01-10 | RedHat JBoss Enterprise Application Platform JMX authentication bypass attempt RuleID : 18794 - Revision : 10 - Type : SERVER-WEBAPP |
Metasploit Database
id | Description |
---|---|
2019-03-05 | JBoss Vulnerability Scanner |
2007-02-20 | JBoss JMX Console Deployer Upload and Execute |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-12-22 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa10627.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0376.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0377.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0378.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0379.nasl - Type : ACT_GATHER_INFO |
2012-03-06 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_42328.nasl - Type : ACT_GATHER_INFO |
2011-04-08 | Name : The remote web server has an authentication bypass vulnerability. File : jboss_eap_jmx_console_auth_bypass2.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-07 17:21:31 |
|
2025-01-07 00:24:02 |
|
2024-11-28 23:08:41 |
|
2024-11-28 12:21:18 |
|
2024-06-28 21:28:00 |
|
2023-02-13 09:29:11 |
|
2023-02-02 21:28:53 |
|
2021-05-04 12:11:11 |
|
2021-04-22 01:11:45 |
|
2020-05-23 13:16:54 |
|
2020-05-23 00:25:22 |
|
2017-08-17 09:22:56 |
|
2016-04-26 19:36:54 |
|
2016-03-03 17:22:00 |
|
2016-03-03 13:21:22 |
|
2015-01-22 17:22:28 |
|
2014-12-23 13:25:43 |
|
2014-02-17 10:54:04 |
|
2014-01-19 21:26:39 |
|
2013-11-11 12:38:39 |
|
2013-07-15 17:18:36 |
|
2013-05-10 23:19:24 |
|