CVE-2007-1036

EXPLOITED RANSOMWARE

JBoss - Auth Bypass

Title source: llm

Description

The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/21080
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/16318
metasploit WORKING POC EXCELLENT
by Patrick Hof, Jens Liebchen, h0ng10 · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/jboss_invoke_deploy.rb
metasploit WORKING POC EXCELLENT
by jduck, Patrick Hof, h0ng10 · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/jboss_maindeployer.rb

Scores

EPSS 0.9014
EPSS Percentile 99.6%

Exploitation Intel

VulnCheck KEV 2019-09-01
Ransomware Use Confirmed

Classification

CWE
CWE-264
Status draft

Affected Products (1)

jboss/jboss_application_server

Timeline

Published Feb 21, 2007
Tracked Since Feb 18, 2026