CVE-2018-10682 Information

Share on:

Description

LICENSE README.md cvefilelist cvelist nvdcve nvdpages.sh scripts test-CVE-2017-1882.markdown test-CVE-2017-18822.markdown tmpvendorlinks DISPUTED LICENSE README.md cvefilelist cvelist nvdcve nvdpages.sh scripts test-CVE-2017-1882.markdown test-CVE-2017-18822.markdown tmpvendorlinks An issue was discovered in WildFly 10.1.2.Final. It is possible for an attacker to access the administration panel on TCP port 9990 without any authentication using \anonymous\ access that is automatically created. Once logged in a misconfiguration present by default (auto-deployment) permits an anonymous user to deploy a malicious .war file leading to remote code execution. NOTE: the vendor indicates that anonymous access is not available in the default installation; however it remains optional because there are several use cases for it including development environments and network architectures that have a proxy server for access control to the WildFly server.

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Reference

https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt

Attack Complexity

LOW

Privileges Required

NONE

User Interaction Required

NONE

Scope

NONE

Confidentiality Impact

UNCHANGED

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score

HIGH

Base Severity

9.8