|
Family: CGI abuses --> Category: attack
JBoss JMX Console DeploymentFileRepository Directory Traversal Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to change the JMX Console DeploymentFileRepository's BaseDir
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a Java service that is affected by a
directory traversal flaw.
Description :
The remote web server appears to be a version of JBoss that fails to
sanitize user-supplied input to the BaseDir parameter used by the
'DeploymentFileRepository' service of JMX Console before using it to
store or delete files. An unauthenticated attacker may be able to
exploit this to alter files on the remote host subject to the
rights of the JBoss user.
See also :
http://www.securityfocus.com/archive/1/archive/1/452830/100/0/threaded
http://jira.jboss.com/jira/browse/JBAS-3861
http://wiki.jboss.org/wiki/Wiki.jsp?page=SecureTheJmxConsole
Solution :
Secure access to the JMX Console as described in the Wiki article
referenced above.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|