mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
147 lines
5.3 KiB
JSON
147 lines
5.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2012-0874",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The (1) JMXInvokerHAServlet and (2) EJBInvokerHAServlet invoker servlets in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 do not require authentication by default in certain profiles, which might allow remote attackers to invoke MBean methods and execute arbitrary code via unspecified vectors. NOTE: this issue can only be exploited when the interceptor is not properly configured with a \"second layer of authentication,\" or when used in conjunction with other vulnerabilities that bypass this second layer."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "RHSA-2013:0192",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0198",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0195",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0221",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0196",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html"
|
|
},
|
|
{
|
|
"name": "57552",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/57552"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0193",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html"
|
|
},
|
|
{
|
|
"name": "51984",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/51984"
|
|
},
|
|
{
|
|
"name": "1028042",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1028042"
|
|
},
|
|
{
|
|
"name": "52054",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/52054"
|
|
},
|
|
{
|
|
"name": "20131219 ESA-2013-094: EMC Data Protection Advisor JBOSS Remote Code Execution Vulnerability",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0134.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0191",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795645",
|
|
"refsource": "MISC",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795645"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0533",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0197",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html"
|
|
},
|
|
{
|
|
"name": "30211",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "http://www.exploit-db.com/exploits/30211"
|
|
},
|
|
{
|
|
"name": "jboss-eap-jmxinvokerhaservlet-code-exec(81511)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81511"
|
|
},
|
|
{
|
|
"name": "RHSA-2013:0194",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html"
|
|
}
|
|
]
|
|
}
|
|
} |