JBoss JMX Console DeploymentFileRepository Directory Traversal File Manipulation

medium Nessus Network Monitor Plugin ID 3862

Synopsis

The remote web server contains a Java service that is affected by a directory traversal flaw.

Description

The remote web server contains a Java service that is affected by a directory traversal flaw. The remote web server appears to be a version of JBoss that fails to sanitize user-supplied input to the BaseDir parameter used by the 'DeploymentFileRepository' service of JMX Console before using it to store or delete files. An unauthenticated attacker may be able to exploit this to alter files on the remote host subject to the privileges of the JBoss user.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.securityfocus.com/archive/1/archive/1/452830/100/0/threaded

http://jira.jboss.com/jira/browse/JBAS-3861

http://wiki.jboss.org/wiki/Wiki.jsp?page=SecureTheJmxConsole

Plugin Details

Severity: Medium

ID: 3862

Family: CGI

Published: 12/14/2006

Updated: 3/6/2019

Nessus ID: 23843

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:jboss:jboss_application_server

Exploitable With

Core Impact

Reference Information

CVE: CVE-2006-5750

BID: 21219