CVE-2014-9000

Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrary code via a crafted request that adds a new user. NOTE: this issue was originally reported for ESB Runtime 3.5.1, but it originates in MMC.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mulesoft:mule_enterprise_management_console:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:20

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/128799 - Exploit () http://packetstormsecurity.com/files/128799 - Exploit
References () http://seclists.org/fulldisclosure/2014/Oct/107 - Exploit () http://seclists.org/fulldisclosure/2014/Oct/107 - Exploit
References () http://seclists.org/fulldisclosure/2014/Oct/98 - Exploit () http://seclists.org/fulldisclosure/2014/Oct/98 - Exploit
References () http://www.mulesoft.org/documentation/display/current/Mule+Enterprise+Management+Console+Security+Update - Vendor Advisory () http://www.mulesoft.org/documentation/display/current/Mule+Enterprise+Management+Console+Security+Update - Vendor Advisory

Information

Published : 2014-11-20 13:55

Updated : 2024-11-21 02:20


NVD link : CVE-2014-9000

Mitre link : CVE-2014-9000

CVE.ORG link : CVE-2014-9000


JSON object : View

Products Affected

mulesoft

  • mule_enterprise_management_console
CWE
CWE-264

Permissions, Privileges, and Access Controls