⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-06-15.

CVE-2010-0738Exposed Dangerous Method or Function in Redhat Jboss Enterprise Application Platform

Severity
9.8CRITICALNVD
NVD6.8NVD5.3CNA7.5CNA5.3VulnCheck5.3CISA5.3
EPSS
91.3%
top 0.34%
CISA KEV
KEVRansomware
Added 2022-05-25
Due 2022-06-15
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedApr 28
KEV addedMay 25
KEV dueJun 15
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.

Description

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

🔴Vulnerability Details

8
GHSA
GHSA-24wp-35x7-5hx9: The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 52022-05-17
GHSA
GHSA-mm58-72w4-25hp: HP ProCurve Manager (PCM) 32022-05-17
GHSA
GHSA-72pp-v9jm-c6xj: The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 42022-05-02
CVEList
CVE-2013-4810: HP ProCurve Manager (PCM) 32013-09-13
CVEList
CVE-2011-4085: The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 52012-11-23

💥Exploits & PoCs

13
Exploit-DB
Hewlett-Packard (HP) UCMDB - JMX-Console Authentication Bypass2015-02-03
Exploit-DB
JBoss & JMX Console - Misconfigured Deployment Scanner2011-10-03
Exploit-DB
JBoss Application Server 4.2 < 4.2.0.CP09 / 4.3 < 4.3.0.CP08 - Remote Command Execution2011-03-04
Exploit-DB
JBoss JMX - Console Beanshell Deployer WAR Upload and Deployment (Metasploit)2011-01-10
Exploit-DB
JBoss JMX - Console Deployer Upload and Execute (Metasploit)2010-10-19

🔍Detection Rules

4
Suricata
ET WEB_SERVER JBoss jmx-console Access Control Bypass Attempt2011-12-10
Suricata
ET WEB_SERVER JBoss jmx-console Probe2011-12-10
Suricata
ET WEB_SPECIFIC_APPS JBoss JMX Console Beanshell Deployer .WAR File Upload and Deployment Cross Site Request Forgery Attempt2010-07-30
Suricata
ET WEB_SPECIFIC_APPS Possible JBoss JMX Console Beanshell Deployer WAR Upload and Deployment Exploit Attempt2010-07-30

📋Vendor Advisories

3
CISA
Red Hat JBoss Authentication Bypass Vulnerability2022-05-25
Red Hat
Invoker servlets authentication bypass (HTTP verb tampering)2011-11-16
Red Hat
JBoss EAP jmx authentication bypass with crafted HTTP request2010-04-26

🕵️Threat Intelligence

3
Fortinet
A Closer Look at Satan Ransomware’s Propagation Techniques2019-05-20
Tenable
SamSam Ransomware: How to Identify and Mitigate the Risk2018-03-28
Tenable
SamSam Ransomware: How to Identify and Mitigate the Risk2018-03-28

📄Research Papers

1
arXiv
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures2025-02-12

💬Community

2
Bugzilla
CVE-2011-4085 Invoker servlets authentication bypass (HTTP verb tampering)2011-11-01
Bugzilla
CVE-2010-0738 JBoss EAP jmx authentication bypass with crafted HTTP request2010-03-16
CVE-2010-0738 — Exposed Dangerous Method or Function | cvebase