Summary
The host is running JBoss Application Server and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to get the all services with their paths on the server and get the sensitive information.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to,
- Status page is publicly accessible. Which leads to leakage of logs of last connections and (in second case) leakage of all services (with their paths) on the server.
- There is no protection against Brute Force attacks at these resources and other private resources with BF vulnerability. The list of all resources of concrete server can be found at page status?full=true.
Affected
JBoss Application Server 5.0 and prior.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Null HTTPd Server Content-Length HTTP Header Buffer overflow Vulnerability
- IBM WebSphere Application Server WS-Security Policy Unspecified vulnerability
- nginx HTTP Request Remote Buffer Overflow Vulnerability
- Apache Traffic Server Synthetic Health Checks Remote DoS Vulnerability
- Zeus Web Server 'SSL2_CLIENT_HELLO' Remote Buffer Overflow Vulnerability