⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-06-15.
CVE-2010-0738 — Exposed Dangerous Method or Function in Redhat Jboss Enterprise Application Platform
Severity
9.8CRITICALNVD
NVD6.8NVD5.3CNA7.5CNA5.3VulnCheck5.3CISA5.3
EPSS
91.3%
top 0.34%
CISA KEV
KEVRansomware
Added 2022-05-25
Due 2022-06-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedApr 28
KEV addedMay 25
KEV dueJun 15
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.
Description
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages5 packages
🔴Vulnerability Details
8GHSA▶
GHSA-24wp-35x7-5hx9: The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5↗2022-05-17
GHSA▶
GHSA-72pp-v9jm-c6xj: The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4↗2022-05-02
CVEList▶
CVE-2011-4085: The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5↗2012-11-23
💥Exploits & PoCs
13Exploit-DB
▶
🔍Detection Rules
4📋Vendor Advisories
3🕵️Threat Intelligence
3📄Research Papers
1arXiv▶
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures↗2025-02-12