CVE-2010-0738
Description
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 90 Days)
Exposed Dangerous Method or Function
IncompleteCommon Consequences
Applicable Platforms
JBoss Application Server 4.2 < 4.2.0.CP09 / 4.3 …
VerifiedJBoss Application Server 4.2 < 4.2.0.CP09 / 4.3 < 4.3.0.CP08 - Remote Command Execution
View Exploit Code →JBoss - Java Class DeploymentFileRepository WAR Deployment (Metasploit)
Verified Metasploit Framework (MSF)JBoss - Java Class DeploymentFileRepository WAR Deployment (Metasploit)
View Exploit Code →JBoss JMX - Console Beanshell Deployer WAR Upload …
Verified Metasploit Framework (MSF)JBoss JMX - Console Beanshell Deployer WAR Upload and Deployment (Metasploit)
View Exploit Code →JBoss & JMX Console - Misconfigured Deployment Scanner
JBoss & JMX Console - Misconfigured Deployment Scanner
View Exploit Code →Jboss Enterprise Application Platform by Redhat
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:-:*:*:*:*:*:*
Jboss Enterprise Application Platform by Redhat
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:-:*:*:*:*:*:*