CISA KEV 정보
| 취약점명 | Red Hat JBoss Authentication Bypass Vulnerability |
|---|---|
| 설명 | The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-264 |
| 등록일 (KEV) | 2022-05-25 |
| 조치 기한 | 2022-06-15 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2010-0738 |
NVD 상세 정보
CVSS v3.1: 5.3 MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NCVSS v2.0: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N설명: The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
CWE: CWE-749
참조
- http://marc.info/?l=bugtraq&m=132129312609324&w=2 [Exploit, Mailing List]
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35 [Third Party Advisory]
- http://secunia.com/advisories/39563 [Broken Link, Vendor Advisory]
- http://securityreason.com/securityalert/8408 [Broken Link]
- http://securitytracker.com/id?1023918 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/39710 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.vupen.com/english/advisories/2010/0992 [Broken Link, Vendor Advisory]
- https://bugzilla.redhat.com/show_bug.cgi?id=574105 [Issue Tracking]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58147 [Third Party Advisory, VDB Entry]
- https://rhn.redhat.com/errata/RHSA-2010-0376.html [Broken Link]
- https://rhn.redhat.com/errata/RHSA-2010-0377.html [Broken Link]
- https://rhn.redhat.com/errata/RHSA-2010-0378.html [Broken Link]
- https://rhn.redhat.com/errata/RHSA-2010-0379.html [Vendor Advisory]
- http://marc.info/?l=bugtraq&m=132129312609324&w=2 [Exploit, Mailing List]
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35 [Third Party Advisory]
- ... 외 12건
This product uses the NVD API but is not endorsed or certified by the NVD.