McAfee SmartFilter Administration < Unauthenticated Access to JBOSS RMI (SB10029)

Critical Nessus Plugin ID 69916


The remote host has a web application installed that is affected by a code execution vulnerability.


The version of McAfee SmartFilter Administration installed on the remote Windows host is earlier than It is, therefore, potentially affected by a code execution vulnerability. The Remote Method Invocation service can be used without authentication to deploy a malicious .war file. By exploiting this flaw, a remote, unauthenticated attacker could execute arbitrary code subject to the privileges of the user running the affected application.


Upgrade to McAfee SmartFilter Administration or later.

See Also

Plugin Details

Severity: Critical

ID: 69916

File Name: mcafee_smartfilter_administration_remote_code_execution.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2013/09/16

Modified: 2016/12/19

Dependencies: 69915

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:smartfilter_administration

Required KB Items: SMB/McAfee SmartFilter Administration/Version, SMB/McAfee SmartFilter Administration/Path

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/08/17

Vulnerability Publication Date: 2012/05/25

Reference Information

CVE: CVE-2012-4599

BID: 55088

OSVDB: 84891

IAVA: 2012-A-0140