5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.974 High
EPSS
Percentile
99.9%
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application’s GET handler by using a different method.
Recent assessments:
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
marc.info/?l=bugtraq&m=132129312609324&w=2
marc.info?l=bugtraq&m=132129312609324&w=2
public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35
secunia.com/advisories/39563
securityreason.com/securityalert/8408
securitytracker.com/id?1023918
www.securityfocus.com/bid/39710
www.vupen.com/english/advisories/2010/0992
access.redhat.com/errata/RHSA-2010:0376
access.redhat.com/errata/RHSA-2010:0377
access.redhat.com/errata/RHSA-2010:0378
access.redhat.com/errata/RHSA-2010:0379
access.redhat.com/kb/docs/DOC-30741
access.redhat.com/security/cve/CVE-2010-0738
bugzilla.redhat.com/show_bug.cgi?id=574105
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0738
exchange.xforce.ibmcloud.com/vulnerabilities/58147
rhn.redhat.com/errata/RHSA-2010-0376.html
rhn.redhat.com/errata/RHSA-2010-0377.html
rhn.redhat.com/errata/RHSA-2010-0378.html
rhn.redhat.com/errata/RHSA-2010-0379.html