First published: Thu Nov 20 2014(Updated: )
Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrary code via a crafted request that adds a new user. NOTE: this issue was originally reported for ESB Runtime 3.5.1, but it originates in MMC.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MuleSoft Mule Enterprise Management Console |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9000 is considered critical due to its potential for remote code execution and unauthorized access.
To fix CVE-2014-9000, update to the latest version of the Mule Enterprise Management Console that includes security patches addressing this vulnerability.
CVE-2014-9000 affects users of the Mule Enterprise Management Console who have authenticated access.
CVE-2014-9000 can facilitate unauthorized administrative access and arbitrary code execution on affected systems.
While an official fix is recommended, restricting access to handler/securityService.rpc can serve as a temporary workaround for CVE-2014-9000.