First published: Thu Dec 03 2009(Updated: )
HP Operations Dashboard has a default password of j2deployer for the j2deployer account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3098.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Operations Dashboard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4188 is considered a high-severity vulnerability due to its potential for remote code execution.
To resolve CVE-2009-4188, change the default password for the j2deployer account to a strong, unique password.
CVE-2009-4188 affects users of HP Operations Dashboard that have not changed the default password for the j2deployer account.
The potential impacts of CVE-2009-4188 include arbitrary code execution and unauthorized access to the system.
Yes, CVE-2009-4188 remains a risk for systems using HP Operations Dashboard with the default j2deployer password.