The admin terminal in Hawt.io does not require authentication, which allows remote attackers to execute arbitrary commands via the k parameter.
References
Link | Resource |
---|---|
https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdf | Issue Tracking Third Party Advisory |
https://github.com/hawtio/hawtio/commit/5289715e4f2657562fdddcbad830a30969b96e1e | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1072716 | Issue Tracking Patch Third Party Advisory |
Information
Published : 2017-12-29 14:29
Updated : 2018-01-11 05:49
NVD link : CVE-2014-0121
Mitre link : CVE-2014-0121
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
hawt
- hawtio
redhat
- jboss_fuse