JBoss Application Server admin interface unauthorized access
|jboss-admin-unauth-access (32596)||Medium Risk|
JBoss Application Server could allow an attacker to gain unauthorized access to the server. By default, the server is configured to allow access to the administrative interface. A remote attacker could exploit this vulnerability to gain unauthorized access to the console and perform unauthorized administrative actions.
No remedy available as of December 2007.
- BugTraq Mailing List, Tue Feb 20 2007 - 07:06:24 CST : Jboss vulnerability.
- BugTraq Mailing List, Tue Feb 20 2007 - 10:30:35 CST: Re: Jboss vulnerability.
- JBoss Web site: JBoss Application Server- A simply powerfule J2EE application server.
- Offensive Security Exploit Database [09-05-2012]: JBoss DeploymentFileRepository WAR Deployment (via JMXInvokerServlet).
- Packetstorm Security Website: JBoss DeploymentFileRepository WAR Deployment.
- CVE-2007-1036: The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.
- OSVDB ID: 33744: JBoss Console / Web Management Direct Request Authentication Bypass
- SECTRACK ID: 1017677: JBoss Default Configuration Lets Remote Users Gain Administrative Access
- US-CERT VU#632656: JBoss Application Server may not properly restrict access to the administrative interface
- JBoss JBoss Application Server
Feb 20, 2007
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.