Vulnerability Details : CVE-2010-0738
Public exploit exists!
Used for ransomware!
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
CVE-2010-0738 is in the CISA Known Exploited Vulnerabilities Catalog
This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
Red Hat JBoss Authentication Bypass Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
Added on
2022-05-25
Action due date
2022-06-15
Exploit prediction scoring system (EPSS) score for CVE-2010-0738
Probability of exploitation activity in the next 30 days: 97.33%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2010-0738
-
JBoss JMX Console Deployer Upload and Execute
Disclosure Date: 2007-02-20First seen: 2020-04-26exploit/multi/http/jboss_maindeployerThis module can be used to execute a payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:MainDeployer functionality. To accomplish this, a temporary HTTP server is created to serve a WA -
JBoss Vulnerability Scanner
First seen: 2020-04-26auxiliary/scanner/http/jboss_vulnscanThis module scans a JBoss instance for a few vulnerabilities. Authors: - Tyler Krpata - Zach Grace <@ztgrace> -
JBoss JMX Console Beanshell Deployer WAR Upload and Deployment
First seen: 2020-04-26auxiliary/admin/http/jboss_bshdeployerThis module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer's createScriptDeployment() method. Authors: - us3r777 <us3r777@n0b0.so> -
SAP URL Scanner
First seen: 2020-04-26auxiliary/scanner/sap/sap_icm_urlscanThis module scans for commonly found SAP Internet Communication Manager URLs and outputs return codes for the user. Authors: - Chris John Riley -
JBoss JMX Console Beanshell Deployer WAR Upload and Deployment
Disclosure Date: 2010-04-26First seen: 2020-04-26exploit/multi/http/jboss_bshdeployerThis module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer\'s createScriptDeployment() method. Authors: - Patrick Hof - jduck <jduc -
JBoss JMX Console DeploymentFileRepository WAR Upload and Deployment
First seen: 2020-04-26auxiliary/admin/http/jboss_deploymentfilerepositoryThis module uses the DeploymentFileRepository class in the JBoss Application Server to deploy a JSP file which then deploys an arbitrary WAR file. Authors: - us3r777 <us3r777@n0b0.so> -
JBoss Java Class DeploymentFileRepository WAR Deployment
Disclosure Date: 2010-04-26First seen: 2020-04-26exploit/multi/http/jboss_deploymentfilerepositoryThis module uses the DeploymentFileRepository class in JBoss Application Server (jbossas) to deploy a JSP file which then deploys the WAR file. Authors: - MC <mc@metasploit.com> - Jacob Giannantonio - Patrick Hof - h0ng10
CVSS scores for CVE-2010-0738
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2010-0738
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0738
-
http://www.securityfocus.com/bid/39710
JBoss Enterprise Application Platform Multiple Vulnerabilities
-
https://rhn.redhat.com/errata/RHSA-2010-0377.html
Red Hat Customer Portal
-
http://securitytracker.com/id?1023918
JBoss Enterprise Application Platform Bugs Let Remote Users Bypass Authentication and Access Potentially Sensitive Information - SecurityTracker
-
https://rhn.redhat.com/errata/RHSA-2010-0376.html
Red Hat Customer Portal
-
http://marc.info/?l=bugtraq&m=132129312609324&w=2
'[security bulletin] HPSBMU02714 SSRT100244 rev.2 - HP Network Node Manager i (NNMi) for HP-UX, Linux' - MARC
-
https://bugzilla.redhat.com/show_bug.cgi?id=574105
574105 – (CVE-2010-0738) CVE-2010-0738 JBoss EAP jmx authentication bypass with crafted HTTP request
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/58147
Red Hat JBoss Enterprise Application Platform JMX Console security bypass CVE-2010-0738 Vulnerability Report
-
http://securityreason.com/securityalert/8408
JBoss, JMX Console, misconfigured DeploymentScanner - CXSecurity.com
-
https://rhn.redhat.com/errata/RHSA-2010-0379.html
RHSA-2010:0379 - Security Advisory - Red Hat Customer Portal
-
https://rhn.redhat.com/errata/RHSA-2010-0378.html
Red Hat Customer Portal
-
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35
Vulnerability Report - JMX-Console in JBoss AS is vulnerable to attack
-
http://www.vupen.com/english/advisories/2010/0992
Webmail | OVH- OVHVendor Advisory
Products affected by CVE-2010-0738
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp03:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp04:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp02:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp01:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp01:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp02:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp03:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp04:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp05:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp06:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp07:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp08:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp06:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp07:*:*:*:*:*:*
- cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp05:*:*:*:*:*:*