CVE-2012-0874

EXPLOITED RANSOMWARE

JBoss EAP/EWP/BRMS/SOA <5.2.0-5.3.1 - RCE

Title source: llm
STIX 2.1

Description

The (1) JMXInvokerHAServlet and (2) EJBInvokerHAServlet invoker servlets in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 do not require authentication by default in certain profiles, which might allow remote attackers to invoke MBean methods and execute arbitrary code via unspecified vectors. NOTE: this issue can only be exploited when the interceptor is not properly configured with a "second layer of authentication," or when used in conjunction with other vulnerabilities that bypass this second layer.

Exploits (1)

exploitdb WORKING POC
by rgod · textremotewindows
https://www.exploit-db.com/exploits/30211

References (18)

Core 18
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0533.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0192.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0198.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0195.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0221.html
Issue Tracking x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=795645
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0196.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/57552
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0193.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/51984
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1028042
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/52054
Third Party Advisory mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0191.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0197.html
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/30211
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/81511
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0194.html

Scores

EPSS 0.5129
EPSS Percentile 97.9%

Details

VulnCheck KEV 2018-03-28
Ransomware Use Confirmed
CWE
CWE-287
Status published
Products (3)
redhat/jboss_enterprise_application_platform 5.2.0
redhat/jboss_enterprise_brms_platform < 5.3.0
redhat/jboss_enterprise_web_platform 5.2.0
Published Feb 05, 2013
Tracked Since Feb 18, 2026