CVE-2007-1036
EXPLOITED RANSOMWAREJBoss - Auth Bypass
Title source: llmDescription
The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/21080
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/16318
metasploit
WORKING POC
EXCELLENT
by Patrick Hof, Jens Liebchen, h0ng10 · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/jboss_invoke_deploy.rb
metasploit
WORKING POC
EXCELLENT
by jduck, Patrick Hof, h0ng10 · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/jboss_maindeployer.rb
References (9)
Scores
EPSS
0.9014
EPSS Percentile
99.6%
Exploitation Intel
VulnCheck KEV
2019-09-01
Ransomware Use
Confirmed
Classification
CWE
CWE-264
Status
draft
Affected Products (1)
jboss/jboss_application_server
Timeline
Published
Feb 21, 2007
Tracked Since
Feb 18, 2026