{"vuid":"VU#632656","idnumber":"632656","name":"JBoss Application Server may not properly restrict access to the administrative interface","keywords":["JBoss","arbitrary access","administrative interface","inspectMBean"],"overview":"The JBoss Application Server may allow unauthenticated, remote access to the administrative console.","clean_desc":"JBoss is an open source application server implemented in Java. Because it is Java-based, JBoss can be used on any operating system that supports Java. JBoss servers can be remotely managed through a web-based administrative interface. If JBoss is installed without using the advanced installer options, the JBoss security features will need to be configured manually. If a JBoss server is configured to allow unauthenticated access to the administrative interface, and is accessible from a remote network, then an attacker may be able to access and modify data on the server. Note that it may be possible to enumerate vulnerable servers by using search engines.","impact":"A remote, unauthenticated attacker may be able to gain administrative access to a JBoss Application Server. Once an attacker has access, they may be able to access and modify data on that server.","resolution":"Use the installer\nUsing the advanced installer options will configure JBoss to only allow authenticated administrative access.","workarounds":"Enable role based security Enabling role based security may mitigate this vulnerability. See the SecureTheJmxConsole page on the JBoss wiki for more information. Restrict access Restricting access to the administrative interface to trusted hosts may mitigate this vulnerability. See the LimitAccessToCertainClients page on the JBoss wiki for more information.","sysaffected":"","thanks":"This vulnerability was reported by Ben Dexter.","author":"This document was written by Ryan Giobbi.","public":["http://wiki.jboss.org/wiki/Wiki.jsp?page=SecureTheJmxConsole","http://wiki.jboss.org/wiki/Wiki.jsp?page=LimitAccessToCertainClients","http://www.jboss.com/","http://wiki.jboss.org/wiki/Wiki.jsp?page=SecureJBoss","http://archives.neohapsis.com/archives/bugtraq/2007-02/0347.html"],"cveids":["CVE-2007-1036"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-02-20T13:45:12Z","publicdate":"2007-02-20T00:00:00Z","datefirstpublished":"2007-02-20T21:05:44Z","dateupdated":"2007-02-21T22:50:40Z","revision":32,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"3","cam_internetinfrastructure":"7","cam_population":"1","cam_impact":"10","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"2.25","cam_scorecurrentwidelyknown":"2.25","cam_scorecurrentwidelyknownexploited":"3.525","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.25,"vulnote":null}