How to Buy
This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The remote web server has an authentication bypass vulnerability.
The version of JBoss Enterprise Application Platform (EAP) running on
the remote host allows unauthenticated access to documents under the
/jmx-console directory. This is due to a misconfiguration in web.xml
which only requires authentication for GET and POST requests.
Specifying a different verb such as HEAD, DELETE, or PUT causes the
default GET handler to be used without authentication.
A remote, unauthenticated attacker could exploit this by deploying a
malicious .war file, resulting in arbitrary code execution.
This version of JBoss EAP likely has other vulnerabilities (refer to
Nessus plugins 33869 and 46181).
See also :
Upgrade to JBoss EAP version 4.2.0.CP09 / 4.3.0.CP08 or later.
If a non-vulnerable version of the software is being used, remove
all <http-method> elements from the <security-constraint> section
of the appropriate web.xml.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.9
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 53337 ()
Bugtraq ID: 39710
CVE ID: CVE-2010-0738
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.