VID |
210025 |
Severity |
40 |
Port |
8080, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The JBoss Application Server is vulnerable to a directory traversal vulnerability in its JMX Console. JBoss Application Server (jbossas) versions 3.2.4 through 4.0.5 could allow a remote attacker to traverse directories and read or modify arbitrary files on the system, caused by improper validation of user-supplied input to the BaseDir parameter used by the 'DeploymentFileRepository' service of JMX Console before using it to store or delete files. An attacker could exploit this vulnerability to read, create, delete, and overwrite arbitrary files from the vulnerable system in the context of the affected application.
* References: http://jira.jboss.com/jira/browse/JBAS-3861 https://community.jboss.org/wiki/securethejmxconsole http://www.securityfocus.com/archive/1/archive/1/452830/100/0/threaded http://securitytracker.com/alerts/2006/Nov/1017289.html http://www.symantec.com/enterprise/research/SYMSA-2006-011.txt http://www.frsirt.com/english/advisories/2006/4724 http://www.frsirt.com/english/advisories/2006/4726 http://secunia.com/advisories/23095
* Platforms Affected: JBoss Application Server version 4.0.5 and earlier versions Any operating system Any version |
Recommendation |
Secure access to the JMX Console, as described in the Wiki article at https://community.jboss.org/wiki/securethejmxconsole |
Related URL |
CVE-2006-5750 (CVE) |
Related URL |
21219 (SecurityFocus) |
Related URL |
30376 (ISS) |
|