Jolokia 1.3.7 < 1.5.0 Remote Code Execution

high Web App Scanning Plugin ID 113203

Synopsis

Jolokia 1.3.7 < 1.5.0 Remote Code Execution

Description

A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 < 1.5.0 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server.

Solution

Update to Jolokia version 1.5.0 or latest.

See Also

https://jolokia.org/#Security_fixes_with_1.5.0

Plugin Details

Severity: High

ID: 113203

Type: remote

Published: 3/24/2022

Updated: 3/13/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-1000130

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2018-1000130

Vulnerability Information

CPE: cpe:2.3:a:jolokia:jolokia:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2018-1000130