CVE-2010-0738

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3...

Basic Information

CVE State
PUBLISHED
Reserved Date
February 26, 2010
Published Date
April 28, 2010
Last Updated
February 07, 2025
Vendor
n/a
Product
n/a
Description
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

CVSS Scores

CVSS v3.1

5.3 - MEDIUM

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (added 2022-05-25 00:00:00 UTC) Source
Used in Malware
Yes (added 2022-05-25 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-05-25 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

jboss_bshdeployer

Type: metasploit • Created: Unknown

Metasploit module for CVE-2010-0738

jboss_deploymentfilerepository

Type: metasploit • Created: Unknown

Metasploit module for CVE-2010-0738

jboss_maindeployer

Type: metasploit • Created: Unknown

Metasploit module for CVE-2010-0738