Korean
<< Back
VID 210025
Severity 40
Port 8080, ...
Protocol TCP
Class CGI
Detailed Description The JBoss Application Server is vulnerable to a directory traversal vulnerability in its JMX Console. JBoss Application Server (jbossas) versions 3.2.4 through 4.0.5 could allow a remote attacker to traverse directories and read or modify arbitrary files on the system, caused by improper validation of user-supplied input to the BaseDir parameter used by the 'DeploymentFileRepository' service of JMX Console before using it to store or delete files. An attacker could exploit this vulnerability to read, create, delete, and overwrite arbitrary files from the vulnerable system in the context of the affected application.

* References:
http://jira.jboss.com/jira/browse/JBAS-3861
https://community.jboss.org/wiki/securethejmxconsole
http://www.securityfocus.com/archive/1/archive/1/452830/100/0/threaded
http://securitytracker.com/alerts/2006/Nov/1017289.html
http://www.symantec.com/enterprise/research/SYMSA-2006-011.txt
http://www.frsirt.com/english/advisories/2006/4724
http://www.frsirt.com/english/advisories/2006/4726
http://secunia.com/advisories/23095

* Platforms Affected:
JBoss Application Server version 4.0.5 and earlier versions
Any operating system Any version
Recommendation Secure access to the JMX Console, as described in the Wiki article at https://community.jboss.org/wiki/securethejmxconsole
Related URL CVE-2006-5750 (CVE)
Related URL 21219 (SecurityFocus)
Related URL 30376 (ISS)