fkie_cve-2018-1287
Vulnerability from fkie_nvd
Published
2018-02-14 14:29
Modified
2024-11-21 03:59
Severity ?
Summary
In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED77B9-D7C2-4AEC-92DE-DE03A95AAA74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73C3EB0-8A76-438C-880B-61370E5904A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E875D86-4ADE-4858-9DDA-3F22E3EC3DBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1EBDE9E-19F1-42FD-8EA3-1D77588F34DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8416D607-6BE7-4A28-932C-B933D01C3941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D9A7BC-8934-4469-AAE6-58C03995E71E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "214F8DAF-0C16-40C2-AE4E-05B71AEE1332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0DD96AE8-6D78-4B43-B62B-F1C8E6880146",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A74525C4-91EC-4CF8-A8BA-F347FD626C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "29465EA2-95F1-4E64-9FCB-A308AAED5D18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "36683483-20E9-4ACC-8595-1D78EEFAA502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C46E8D60-83F0-444A-9A2A-0F99648F9996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "092F5B2E-0ACF-4DD1-B6D5-0C62EA24DE56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F40FBF7E-5928-4B11-9212-70072E24EA35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CF4BAC2D-23D2-429D-848B-5676B592B214",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2400EE9B-AE16-4168-B480-E7C9F64132C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D97ACC37-CFF6-4A6A-B22C-5CAF2EE15F7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ECC08CE-3190-40D5-83FD-264DF1DA95E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E701D3B7-2E77-4A32-B861-9444D5B471F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25532F1A-839A-4377-9626-56ECE6D075B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C942DB08-78C9-458B-BDB2-CF254C198B79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BEAE561-E2A5-4046-9394-F457BB15609C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05D5B5D7-E726-4E96-9AF5-973F67E55398",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "AFA42141-AFF3-4C81-9301-D2A7A3300D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACE8BA8-4681-4ABA-98FC-BFECA841C1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7E603210-12A2-4A7E-ADD8-C3682A936403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "AF1E2F35-AF51-40D1-BCD2-A128CE41FF31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.7:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C3C23804-E6C2-44A9-B1D4-FEABCF3EC61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B753A6A8-F529-4D11-BA83-7B322733A256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AC5620AD-A146-4116-80D8-AB483BADC930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F5070E08-09CF-42A1-A49A-509BF9D0EE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "095A1D9D-F0B7-46A6-9229-57AB34F7EAA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7DCE1F49-EFA0-49E1-9E62-506945B3712D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2F7D9053-5253-4DE4-BE7D-8B532AF7FBD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D043CB03-FAD0-479A-92AC-1F8CC24F3A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BAC229B1-F759-47DD-B62C-EE757A364CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "88191D59-DB77-413B-8E8B-3C6D996E48E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0D1CA2-4BF7-421D-8842-962B273580EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.11:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "71FCA156-E87D-4825-87C5-673531DB44D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.11:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "DACDA479-15C6-4BFE-8C42-D535D1AB855D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB2043F-15B4-4C12-B58C-8F5561653BFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F5E73-CCDF-4527-B08B-EFFADB0E3D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.12:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BD38F9FA-4762-4475-8202-9E9E6182D66A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E7C4092-4202-405E-AF56-CD5546B70D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E410803F-AD95-4932-97F5-F30B9F008493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1F638DD7-255C-44E6-8F8D-07E1AAED9319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47D6AF1-EFD7-4394-8C70-B4BE3112759C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1468AA45-BC88-47BA-B0D6-458D0ADA9791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "39DA93C9-78FB-45AA-B9AA-2323E837A303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "4C7153C2-6B3E-4B53-9BCF-8B82B98723C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "B9482829-424A-4A11-9EAB-A6235427B3B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "0816AED9-B327-437C-A800-625EE2C3531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C51709F-4FCE-44E5-A947-110A4540C777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "38D90A05-652B-4EED-8049-2ED1F81A56C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "ECAEB98D-73FF-45FA-BD88-D62EB974F54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5AB77E0F-7DFE-4CAF-B033-E73104715CBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "45779CB5-D2C5-4BBA-957E-212E7E711259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3CF54A-78EB-4686-A564-FB5D9FD18BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6D997457-0740-4FBD-8995-FC4C63DA1A5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FC445420-3488-4447-8781-C93CB1B4FFFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "B1739511-AFE0-4E14-AD20-1E52E17A3705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E68080-091E-409C-B281-F8FCA21D82F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:jmeter:3.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F9279C4E-FDC3-41DF-BE6D-58CE21DA802C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code."
    },
    {
      "lang": "es",
      "value": "En Apache JMeter 2.X y 3.X, al emplear solo Distributed Test (basado en RMI), el servidor jmeter enlaza el registro RMI al host de caracteres comod\u00edn. Esto podr\u00eda permitir que un atacante obtenga acceso a JMeterEngine y env\u00ede c\u00f3digo no autorizado."
    }
  ],
  "id": "CVE-2018-1287",
  "lastModified": "2024-11-21T03:59:33.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-14T14:29:00.210",
  "references": [
    {
      "source": "security@apache.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3CCAH9fUpYsFx1%2Brwz1A%3Dmc7wAgbDHARyj1VrWNg41y9OySuL1mqw%40mail.gmail.com%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103068"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/31e0adbeca9d865ff74d0906b2248a41a1457cb54c1afbe5947df58b%40%3Cissues.jmeter.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3CCAH9fUpYsFx1%2Brwz1A%3Dmc7wAgbDHARyj1VrWNg41y9OySuL1mqw%40mail.gmail.com%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/31e0adbeca9d865ff74d0906b2248a41a1457cb54c1afbe5947df58b%40%3Cissues.jmeter.apache.org%3E"
    }
  ],
  "sourceIdentifier": "security@apache.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…