Severity
5.8MEDIUM
EPSS
0.3%
top 46.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateMay 4

Description

Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 does not check the JON agent key, which allows remote attackers to spoof the identity of arbitrary agents via the registered agent name.

CVSS vector

AV:N/AC:M/C:P/I:P/A:NExploitability: 8.6 | Impact: 4.9

Affected Packages1 packages

๐Ÿ”ดVulnerability Details

2
GHSA
GHSA-fhpq-g3rr-xhmq: Red Hat JBoss Operations Network (JON) before 2โ†—2022-05-04
โ–ถ
CVEList
CVE-2012-0052: Red Hat JBoss Operations Network (JON) before 2โ†—2014-02-14
โ–ถ

๐Ÿ“‹Vendor Advisories

2
Red Hat
JON: Unapproved agents can connect using the name of an existing approved agentโ†—2012-02-01
โ–ถ
Red Hat
kernel: proc: /proc/<pid>/mem mem_write insufficient permission checkingโ†—2012-01-18
โ–ถ

๐Ÿ’ฌCommunity

3
Bugzilla
CVE-2012-4401 moodle: Course topics permission issue (MSA-12-0052)โ†—2012-09-17
โ–ถ
Bugzilla
CVE-2012-2922 drupal7: full path disclosure vulnerabilityโ†—2012-05-23
โ–ถ
Bugzilla
CVE-2012-0052 JON: Unapproved agents can connect using the name of an existing approved agentโ†—2012-01-16
โ–ถ