The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
Published 2010-04-28 22:30:00
Updated 2023-02-13 04:16:44
Source Red Hat, Inc.
View at NVD,   CVE.org

CVE-2010-0738 is in the CISA Known Exploited Vulnerabilities Catalog

This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
Red Hat JBoss Authentication Bypass Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
Added on 2022-05-25 Action due date 2022-06-15

Exploit prediction scoring system (EPSS) score for CVE-2010-0738

Probability of exploitation activity in the next 30 days: 97.33%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2010-0738

  • JBoss JMX Console Deployer Upload and Execute
    Disclosure Date: 2007-02-20
    First seen: 2020-04-26
    exploit/multi/http/jboss_maindeployer
    This module can be used to execute a payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:MainDeployer functionality. To accomplish this, a temporary HTTP server is created to serve a WA
  • JBoss Vulnerability Scanner
    First seen: 2020-04-26
    auxiliary/scanner/http/jboss_vulnscan
    This module scans a JBoss instance for a few vulnerabilities. Authors: - Tyler Krpata - Zach Grace <@ztgrace>
  • JBoss JMX Console Beanshell Deployer WAR Upload and Deployment
    First seen: 2020-04-26
    auxiliary/admin/http/jboss_bshdeployer
    This module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer's createScriptDeployment() method. Authors: - us3r777 <us3r777@n0b0.so>
  • SAP URL Scanner
    First seen: 2020-04-26
    auxiliary/scanner/sap/sap_icm_urlscan
    This module scans for commonly found SAP Internet Communication Manager URLs and outputs return codes for the user. Authors: - Chris John Riley
  • JBoss JMX Console Beanshell Deployer WAR Upload and Deployment
    Disclosure Date: 2010-04-26
    First seen: 2020-04-26
    exploit/multi/http/jboss_bshdeployer
    This module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer\'s createScriptDeployment() method. Authors: - Patrick Hof - jduck <jduc
  • JBoss JMX Console DeploymentFileRepository WAR Upload and Deployment
    First seen: 2020-04-26
    auxiliary/admin/http/jboss_deploymentfilerepository
    This module uses the DeploymentFileRepository class in the JBoss Application Server to deploy a JSP file which then deploys an arbitrary WAR file. Authors: - us3r777 <us3r777@n0b0.so>
  • JBoss Java Class DeploymentFileRepository WAR Deployment
    Disclosure Date: 2010-04-26
    First seen: 2020-04-26
    exploit/multi/http/jboss_deploymentfilerepository
    This module uses the DeploymentFileRepository class in JBoss Application Server (jbossas) to deploy a JSP file which then deploys the WAR file. Authors: - MC <mc@metasploit.com> - Jacob Giannantonio - Patrick Hof - h0ng10

CVSS scores for CVE-2010-0738

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
5.0
MEDIUM AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
NIST

CWE ids for CVE-2010-0738

  • Assigned by: nvd@nist.gov (Primary)

References for CVE-2010-0738

Products affected by CVE-2010-0738

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!