Vulnerability Details : CVE-2010-0738
Public exploit exists!
Used for ransomware!
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
Products affected by CVE-2010-0738
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:-:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:-:*:*:*:*:*:*
CVE-2010-0738 is in the CISA Known Exploited Vulnerabilities Catalog
This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
Red Hat JBoss Authentication Bypass Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2010-0738
Added on
2022-05-25
Action due date
2022-06-15
Exploit prediction scoring system (EPSS) score for CVE-2010-0738
96.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2010-0738
-
JBoss JMX Console Deployer Upload and Execute
Disclosure Date: 2007-02-20First seen: 2020-04-26exploit/multi/http/jboss_maindeployerThis module can be used to execute a payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:MainDeployer functionality. To accomplish this, a temporary HTTP server is created to serve a WA -
JBoss Vulnerability Scanner
First seen: 2020-04-26auxiliary/scanner/http/jboss_vulnscanThis module scans a JBoss instance for a few vulnerabilities. Authors: - Tyler Krpata - Zach Grace <@ztgrace> -
JBoss JMX Console Beanshell Deployer WAR Upload and Deployment
First seen: 2020-04-26auxiliary/admin/http/jboss_bshdeployerThis module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer's createScriptDeployment() method. Authors: - us3r777 <us3r777@n0b0.so> -
SAP URL Scanner
First seen: 2020-04-26auxiliary/scanner/sap/sap_icm_urlscanThis module scans for commonly found SAP Internet Communication Manager URLs and outputs return codes for the user. Authors: - Chris John Riley -
JBoss JMX Console Beanshell Deployer WAR Upload and Deployment
Disclosure Date: 2010-04-26First seen: 2020-04-26exploit/multi/http/jboss_bshdeployerThis module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer\'s createScriptDeployment() method. Authors: - Patrick Hof - jduck <jduc -
JBoss JMX Console DeploymentFileRepository WAR Upload and Deployment
First seen: 2020-04-26auxiliary/admin/http/jboss_deploymentfilerepositoryThis module uses the DeploymentFileRepository class in the JBoss Application Server to deploy a JSP file which then deploys an arbitrary WAR file. Authors: - us3r777 <us3r777@n0b0.so> -
JBoss Java Class DeploymentFileRepository WAR Deployment
Disclosure Date: 2010-04-26First seen: 2020-04-26exploit/multi/http/jboss_deploymentfilerepositoryThis module uses the DeploymentFileRepository class in JBoss Application Server (jbossas) to deploy a JSP file which then deploys the WAR file. Authors: - MC <mc@metasploit.com> - Jacob Giannantonio - Patrick Hof - h0ng10
CVSS scores for CVE-2010-0738
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST | 2024-06-28 |
References for CVE-2010-0738
-
http://www.securityfocus.com/bid/39710
JBoss Enterprise Application Platform Multiple VulnerabilitiesBroken Link;Third Party Advisory;VDB Entry
-
https://rhn.redhat.com/errata/RHSA-2010-0377.html
Red Hat Customer PortalBroken Link
-
http://securitytracker.com/id?1023918
JBoss Enterprise Application Platform Bugs Let Remote Users Bypass Authentication and Access Potentially Sensitive Information - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
https://rhn.redhat.com/errata/RHSA-2010-0376.html
Red Hat Customer PortalBroken Link
-
http://marc.info/?l=bugtraq&m=132129312609324&w=2
'[security bulletin] HPSBMU02714 SSRT100244 rev.2 - HP Network Node Manager i (NNMi) for HP-UX, Linux' - MARCExploit;Mailing List
-
https://bugzilla.redhat.com/show_bug.cgi?id=574105
574105 – (CVE-2010-0738) CVE-2010-0738 JBoss EAP jmx authentication bypass with crafted HTTP requestIssue Tracking
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/58147
Red Hat JBoss Enterprise Application Platform JMX Console security bypass CVE-2010-0738 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://securityreason.com/securityalert/8408
JBoss, JMX Console, misconfigured DeploymentScanner - CXSecurity.comBroken Link
-
https://rhn.redhat.com/errata/RHSA-2010-0379.html
RHSA-2010:0379 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
https://rhn.redhat.com/errata/RHSA-2010-0378.html
Red Hat Customer PortalBroken Link
-
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35
Vulnerability Report - JMX-Console in JBoss AS is vulnerable to attackThird Party Advisory
-
http://www.vupen.com/english/advisories/2010/0992
Webmail | OVH- OVHBroken Link;Vendor Advisory
-
http://secunia.com/advisories/39563
LoginBroken Link;Vendor Advisory
Jump to