CVE-2018-10682

An issue was discovered in WildFly 10.1.2.Final. It is possible for an attacker to access the administration panel on TCP port 9990 without any authentication using "anonymous" access that is automatically created. Once logged in, a misconfiguration present by default (auto-deployment) permits an anonymous user to deploy a malicious .war file, leading to remote code execution. NOTE: the vendor indicates that anonymous access is not available in the default installation; however, it remains optional because there are several use cases for it, including development environments and network architectures that have a proxy server for access control to the WildFly server
Configurations

Configuration 1 (hide)

cpe:2.3:a:wildfly:wildfly:10.1.2:final:*:*:*:*:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt - Exploit, Third Party Advisory () https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt - Exploit, Third Party Advisory

07 Nov 2023, 02:51

Type Values Removed Values Added
Summary ** DISPUTED ** An issue was discovered in WildFly 10.1.2.Final. It is possible for an attacker to access the administration panel on TCP port 9990 without any authentication using "anonymous" access that is automatically created. Once logged in, a misconfiguration present by default (auto-deployment) permits an anonymous user to deploy a malicious .war file, leading to remote code execution. NOTE: the vendor indicates that anonymous access is not available in the default installation; however, it remains optional because there are several use cases for it, including development environments and network architectures that have a proxy server for access control to the WildFly server. An issue was discovered in WildFly 10.1.2.Final. It is possible for an attacker to access the administration panel on TCP port 9990 without any authentication using "anonymous" access that is automatically created. Once logged in, a misconfiguration present by default (auto-deployment) permits an anonymous user to deploy a malicious .war file, leading to remote code execution. NOTE: the vendor indicates that anonymous access is not available in the default installation; however, it remains optional because there are several use cases for it, including development environments and network architectures that have a proxy server for access control to the WildFly server

Information

Published : 2018-05-09 08:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10682

Mitre link : CVE-2018-10682

CVE.ORG link : CVE-2018-10682


JSON object : View

Products Affected

wildfly

  • wildfly
CWE
CWE-287

Improper Authentication