When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3CCAH9fUpaNzk5am8oFe07RQ-kynCsQv54yB-uYs9bEnz7tbX-O7g%40mail.gmail.com%3E - Mailing List, Vendor Advisory | |
References | () https://bz.apache.org/bugzilla/show_bug.cgi?id=62039 - Issue Tracking, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/31e0adbeca9d865ff74d0906b2248a41a1457cb54c1afbe5947df58b%40%3Cissues.jmeter.apache.org%3E - |
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-02-13 12:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1297
Mitre link : CVE-2018-1297
CVE.ORG link : CVE-2018-1297
JSON object : View
Products Affected
apache
- jmeter
CWE
CWE-319
Cleartext Transmission of Sensitive Information