First published: Tue Mar 16 2010(Updated: )
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/hibernate3 | <1:3.2.4-1.SP1_CP10.0jpp.ep1.1.el4 | 1:3.2.4-1.SP1_CP10.0jpp.ep1.1.el4 |
redhat/hibernate3-annotations | <0:3.3.1-1.12.GA_CP03.ep1.el4 | 0:3.3.1-1.12.GA_CP03.ep1.el4 |
redhat/hsqldb | <1:1.8.0.8-3.patch03.1jpp.ep1.3.el4 | 1:1.8.0.8-3.patch03.1jpp.ep1.3.el4 |
redhat/jacorb | <0:2.3.0-1jpp.ep1.10.el4 | 0:2.3.0-1jpp.ep1.10.el4 |
redhat/jakarta-commons-httpclient | <1:3.0.1-1.patch01.1jpp.ep1.4.el4 | 1:3.0.1-1.patch01.1jpp.ep1.4.el4 |
redhat/jboss-aop | <0:1.5.5-3.CP05.2.ep1.el4 | 0:1.5.5-3.CP05.2.ep1.el4 |
redhat/jbossas | <0:4.2.0-6.GA_CP09.6.ep1.el4 | 0:4.2.0-6.GA_CP09.6.ep1.el4 |
redhat/jboss-cache | <0:1.4.1-6.SP14.1.ep1.el4 | 0:1.4.1-6.SP14.1.ep1.el4 |
redhat/jboss-remoting | <0:2.2.3-3.SP2.ep1.el4 | 0:2.2.3-3.SP2.ep1.el4 |
redhat/jboss-seam | <0:1.2.1-1.ep1.24.el4 | 0:1.2.1-1.ep1.24.el4 |
redhat/jbossts | <1:4.2.3-1.SP5_CP09.1jpp.ep1.1.el4 | 1:4.2.3-1.SP5_CP09.1jpp.ep1.1.el4 |
redhat/jbossweb | <0:2.0.0-6.CP13.0jpp.ep1.1.el4 | 0:2.0.0-6.CP13.0jpp.ep1.1.el4 |
redhat/rh-eap-docs | <0:4.2.0-7.GA_CP09.ep1.5.el4 | 0:4.2.0-7.GA_CP09.ep1.5.el4 |
redhat/hibernate3 | <1:3.2.4-1.SP1_CP10.0jpp.ep1.1.el5 | 1:3.2.4-1.SP1_CP10.0jpp.ep1.1.el5 |
redhat/hibernate3-annotations | <0:3.3.1-1.12.GA_CP03.ep1.el5 | 0:3.3.1-1.12.GA_CP03.ep1.el5 |
redhat/jacorb | <0:2.3.0-1jpp.ep1.10.1.el5 | 0:2.3.0-1jpp.ep1.10.1.el5 |
redhat/jboss-aop | <0:1.5.5-3.CP05.2.ep1.1.el5 | 0:1.5.5-3.CP05.2.ep1.1.el5 |
redhat/jbossas | <0:4.2.0-6.GA_CP09.6.ep1.el5 | 0:4.2.0-6.GA_CP09.6.ep1.el5 |
redhat/jboss-cache | <0:1.4.1-6.SP14.1.ep1.1.el5 | 0:1.4.1-6.SP14.1.ep1.1.el5 |
redhat/jboss-remoting | <0:2.2.3-3.SP2.ep1.1.el5 | 0:2.2.3-3.SP2.ep1.1.el5 |
redhat/jboss-seam | <0:1.2.1-1.ep1.24.el5 | 0:1.2.1-1.ep1.24.el5 |
redhat/jbossts | <1:4.2.3-1.SP5_CP09.1jpp.ep1.1.1.el5 | 1:4.2.3-1.SP5_CP09.1jpp.ep1.1.1.el5 |
redhat/jbossweb | <0:2.0.0-6.CP13.0jpp.ep1.1.1.el5 | 0:2.0.0-6.CP13.0jpp.ep1.1.1.el5 |
redhat/rh-eap-docs | <0:4.2.0-7.GA_CP09.ep1.4.1.el5 | 0:4.2.0-7.GA_CP09.ep1.4.1.el5 |
redhat/jbossas | <0:4.3.0-7.GA_CP08.5.ep1.el4 | 0:4.3.0-7.GA_CP08.5.ep1.el4 |
redhat/jboss-messaging | <0:1.4.0-3.SP3_CP10.2.ep1.el4 | 0:1.4.0-3.SP3_CP10.2.ep1.el4 |
redhat/jboss-seam | <0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.20.el4 | 0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.20.el4 |
redhat/jboss-seam2 | <0:2.0.2.FP-1.ep1.23.el4 | 0:2.0.2.FP-1.ep1.23.el4 |
redhat/jbossws | <0:2.0.1-5.SP2_CP08.1.ep1.el4 | 0:2.0.1-5.SP2_CP08.1.ep1.el4 |
redhat/rh-eap-docs | <0:4.3.0-7.GA_CP08.ep1.6.el4 | 0:4.3.0-7.GA_CP08.ep1.6.el4 |
redhat/jbossas | <0:4.3.0-7.GA_CP08.5.ep1.el5 | 0:4.3.0-7.GA_CP08.5.ep1.el5 |
redhat/jboss-messaging | <0:1.4.0-3.SP3_CP10.2.ep1.el5 | 0:1.4.0-3.SP3_CP10.2.ep1.el5 |
redhat/jboss-seam | <0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.20.el5.1 | 0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.20.el5.1 |
redhat/jboss-seam2 | <0:2.0.2.FP-1.ep1.23.el5 | 0:2.0.2.FP-1.ep1.23.el5 |
redhat/jbossws | <0:2.0.1-5.SP2_CP08.1.ep1.1.el5 | 0:2.0.1-5.SP2_CP08.1.ep1.1.el5 |
redhat/rh-eap-docs | <0:4.3.0-7.GA_CP08.ep1.5.el5 | 0:4.3.0-7.GA_CP08.ep1.5.el5 |
Red Hat JBoss Enterprise Application Platform | =4.2.0 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0 | |
Red Hat JBoss Enterprise Application Platform | =4.2 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp01 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp02 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp03 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp04 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp05 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp06 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp07 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0-cp08 | |
Red Hat JBoss Enterprise Application Platform | =4.3 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp01 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp02 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp03 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp04 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp05 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp06 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0-cp07 | |
Red Hat JBoss Middleware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2010-0738 is considered a high severity vulnerability.
To fix CVE-2010-0738, you should upgrade to the appropriate patched version of the affected packages from Red Hat.
CVE-2010-0738 allows attackers to bypass access control and send requests using methods other than GET and POST.
CVE-2010-0738 affects specific versions of Red Hat JBoss Enterprise Application Platform including 4.2.0 and 4.3.0.
The potential impact of CVE-2010-0738 includes unauthorized access and manipulation of server resources.