Jolokia Arbitrary File Read

high Web App Scanning Plugin ID 113200

Synopsis

Jolokia Arbitrary File Read

Description

Jolokia is a JMX-HTTP bridge giving an alternative to JSR-160 connectors. Jolokia includes a compilerDirectivesAdd action, which allows an unauthenticated attacker to read arbitrary files on the server.

Solution

If the jolokia endpoint is not needed it should be disabled. If the jolokia endpoint is required it should be secured using Spring Security.

See Also

https://thinkloveshare.com/en/hacking/ssrf_to_rce_with_jolokia_and_mbeans/

Plugin Details

Severity: High

ID: 113200

Type: remote

Published: 3/24/2022

Updated: 3/13/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: Tenable

Vulnerability Information

CPE: cpe:2.3:a:jolokia:jolokia:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information