CVE-2010-0738
Assigned by [email protected]
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
Weaknesses (CWE)
CWE-749 — Exposed Dangerous Method or Function
security tool ActiveX control allows download or upload of filessecurity tool ActiveX control allows download or upload of files
CVSS
5.3
Base Score: 5.3/10 MEDIUM
Exploitability: 3.9/10
Impact: 1.4/10
Access Vector
- Availability: NONE
- Confidentiality: NONE
- Integrity: LOW
Impact
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Attack Patterns (CAPEC)
CAPEC-500 — WebView Injection
An adversary, through a previously installed malicious application, injects code into the context of a web page displayed by a WebView component. Through the injected code, an adversary is able to manipulate the DOM tree and cookies of the page, expose sensitive information, and can launch attacks against the web application from within the web page.
Typical severity: High
Prerequisites: An adversary must be able install a purpose built malicious application onto the device and convince the user to execute it. The malicious application is designed to target a specific web application and is used to load the target web pages via the WebView component. For example, an adversary may develop an application that interacts with Facebook via WebView and adds a new feature that a user desires. The user would install this 3rd party app instead of the Facebook app.
Solutions: The only known mitigation to this type of attack is to keep the malicious application off the system. There is nothing that can be done to the target application to protect itself from a malicious application that has been installed and executed.
References
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35
http://secunia.com/advisories/39563
http://securityreason.com/securityalert/8408
http://securitytracker.com/id?1023918
http://www.securityfocus.com/bid/39710
http://www.vupen.com/english/advisories/2010/0992
https://bugzilla.redhat.com/show_bug.cgi?id=574105
https://exchange.xforce.ibmcloud.com/vulnerabilities/58147
https://rhn.redhat.com/errata/RHSA-2010-0376.html
https://rhn.redhat.com/errata/RHSA-2010-0377.html
https://rhn.redhat.com/errata/RHSA-2010-0378.html
https://rhn.redhat.com/errata/RHSA-2010-0379.html
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://marc.info/?l=bugtraq&m=132129312609324&w=2
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35
http://secunia.com/advisories/39563
http://securityreason.com/securityalert/8408
http://securitytracker.com/id?1023918
http://www.securityfocus.com/bid/39710
http://www.vupen.com/english/advisories/2010/0992
https://bugzilla.redhat.com/show_bug.cgi?id=574105
https://exchange.xforce.ibmcloud.com/vulnerabilities/58147
https://rhn.redhat.com/errata/RHSA-2010-0376.html
https://rhn.redhat.com/errata/RHSA-2010-0377.html
https://rhn.redhat.com/errata/RHSA-2010-0378.html
https://rhn.redhat.com/errata/RHSA-2010-0379.html
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-0738
