fkie_cve-2018-1297
Vulnerability from fkie_nvd
Published
2018-02-13 12:29
Modified
2024-11-21 03:59
Severity ?
Summary
When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:jmeter:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "89ED77B9-D7C2-4AEC-92DE-DE03A95AAA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B73C3EB0-8A76-438C-880B-61370E5904A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E875D86-4ADE-4858-9DDA-3F22E3EC3DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1EBDE9E-19F1-42FD-8EA3-1D77588F34DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8416D607-6BE7-4A28-932C-B933D01C3941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C6D9A7BC-8934-4469-AAE6-58C03995E71E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "214F8DAF-0C16-40C2-AE4E-05B71AEE1332", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "0DD96AE8-6D78-4B43-B62B-F1C8E6880146", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74525C4-91EC-4CF8-A8BA-F347FD626C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "29465EA2-95F1-4E64-9FCB-A308AAED5D18", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "36683483-20E9-4ACC-8595-1D78EEFAA502", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.3.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "C46E8D60-83F0-444A-9A2A-0F99648F9996", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "092F5B2E-0ACF-4DD1-B6D5-0C62EA24DE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F40FBF7E-5928-4B11-9212-70072E24EA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF4BAC2D-23D2-429D-848B-5676B592B214", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "2400EE9B-AE16-4168-B480-E7C9F64132C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5:rc3:*:*:*:*:*:*", "matchCriteriaId": "D97ACC37-CFF6-4A6A-B22C-5CAF2EE15F7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "0ECC08CE-3190-40D5-83FD-264DF1DA95E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "E701D3B7-2E77-4A32-B861-9444D5B471F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "25532F1A-839A-4377-9626-56ECE6D075B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.5.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "C942DB08-78C9-458B-BDB2-CF254C198B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "9BEAE561-E2A5-4046-9394-F457BB15609C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "05D5B5D7-E726-4E96-9AF5-973F67E55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "AFA42141-AFF3-4C81-9301-D2A7A3300D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "6ACE8BA8-4681-4ABA-98FC-BFECA841C1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "7E603210-12A2-4A7E-ADD8-C3682A936403", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "AF1E2F35-AF51-40D1-BCD2-A128CE41FF31", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "C3C23804-E6C2-44A9-B1D4-FEABCF3EC61B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "B753A6A8-F529-4D11-BA83-7B322733A256", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "AC5620AD-A146-4116-80D8-AB483BADC930", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.8:rc2:*:*:*:*:*:*", "matchCriteriaId": "F5070E08-09CF-42A1-A49A-509BF9D0EE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "095A1D9D-F0B7-46A6-9229-57AB34F7EAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.9:rc1:*:*:*:*:*:*", "matchCriteriaId": "7DCE1F49-EFA0-49E1-9E62-506945B3712D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.9:rc2:*:*:*:*:*:*", "matchCriteriaId": "2F7D9053-5253-4DE4-BE7D-8B532AF7FBD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "D043CB03-FAD0-479A-92AC-1F8CC24F3A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAC229B1-F759-47DD-B62C-EE757A364CD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "88191D59-DB77-413B-8E8B-3C6D996E48E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "DF0D1CA2-4BF7-421D-8842-962B273580EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "71FCA156-E87D-4825-87C5-673531DB44D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "DACDA479-15C6-4BFE-8C42-D535D1AB855D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "1FB2043F-15B4-4C12-B58C-8F5561653BFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "DE1F5E73-CCDF-4527-B08B-EFFADB0E3D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.12:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD38F9FA-4762-4475-8202-9E9E6182D66A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.13:*:*:*:*:*:*:*", "matchCriteriaId": "2E7C4092-4202-405E-AF56-CD5546B70D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "E410803F-AD95-4932-97F5-F30B9F008493", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:2.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F638DD7-255C-44E6-8F8D-07E1AAED9319", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F47D6AF1-EFD7-4394-8C70-B4BE3112759C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1468AA45-BC88-47BA-B0D6-458D0ADA9791", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "39DA93C9-78FB-45AA-B9AA-2323E837A303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "4C7153C2-6B3E-4B53-9BCF-8B82B98723C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "B9482829-424A-4A11-9EAB-A6235427B3B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "0816AED9-B327-437C-A800-625EE2C3531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C51709F-4FCE-44E5-A947-110A4540C777", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "38D90A05-652B-4EED-8049-2ED1F81A56C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "ECAEB98D-73FF-45FA-BD88-D62EB974F54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "5AB77E0F-7DFE-4CAF-B033-E73104715CBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.1:rc4:*:*:*:*:*:*", "matchCriteriaId": "45779CB5-D2C5-4BBA-957E-212E7E711259", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A3CF54A-78EB-4686-A564-FB5D9FD18BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D997457-0740-4FBD-8995-FC4C63DA1A5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "FC445420-3488-4447-8781-C93CB1B4FFFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.2:rc3:*:*:*:*:*:*", "matchCriteriaId": "B1739511-AFE0-4E14-AD20-1E52E17A3705", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F8E68080-091E-409C-B281-F8FCA21D82F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:jmeter:3.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F9279C4E-FDC3-41DF-BE6D-58CE21DA802C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code." }, { "lang": "es", "value": "Apache JMeter, solo como Distributed Test (basado en RMI), en versiones 2.x y 3.x, emplea una conexi\u00f3n RMI insegura. Esto podr\u00eda permitir que un atacante obtenga acceso a JMeterEngine y env\u00ede c\u00f3digo no autorizado." } ], "id": "CVE-2018-1297", "lastModified": "2024-11-21T03:59:34.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-13T12:29:00.207", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3CCAH9fUpaNzk5am8oFe07RQ-kynCsQv54yB-uYs9bEnz7tbX-O7g%40mail.gmail.com%3E" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=62039" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/31e0adbeca9d865ff74d0906b2248a41a1457cb54c1afbe5947df58b%40%3Cissues.jmeter.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3CCAH9fUpaNzk5am8oFe07RQ-kynCsQv54yB-uYs9bEnz7tbX-O7g%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=62039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/31e0adbeca9d865ff74d0906b2248a41a1457cb54c1afbe5947df58b%40%3Cissues.jmeter.apache.org%3E" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…