search menu icon-carat-right cmu-wordmark

CERT Coordination Center

JBoss Application Server may not properly restrict access to the administrative interface

Vulnerability Note VU#632656

Original Release Date: 2007-02-20 | Last Revised: 2007-02-21

Overview

The JBoss Application Server may allow unauthenticated, remote access to the administrative console.

Description

JBoss is an open source application server implemented in Java. Because it is Java-based, JBoss can be used on any operating system that supports Java. JBoss servers can be remotely managed through a web-based administrative interface.

If JBoss is installed without using the advanced installer options, the JBoss security features will need to be configured manually. If a JBoss server is configured to allow unauthenticated access to the administrative interface, and is accessible from a remote network, then an attacker may be able to access and modify data on the server.

Note that it may be possible to enumerate vulnerable servers by using search engines.

Impact

A remote, unauthenticated attacker may be able to gain administrative access to a JBoss Application Server. Once an attacker has access, they may be able to access and modify data on that server.

Solution

Use the installer
Using the advanced installer options will configure JBoss to only allow authenticated administrative access.


Enable role based security

Enabling role based security may mitigate this vulnerability. See the SecureTheJmxConsole page on the JBoss wiki for more information.

Restrict access

Restricting access to the administrative interface to trusted hosts may mitigate this vulnerability. See the LimitAccessToCertainClients page on the JBoss wiki for more information.

Vendor Information

632656
 

Red Hat, Inc. Affected

Updated:  February 21, 2007

Status

Affected

Vendor Statement

The JBoss AS console manager should always be secured prior to deployment, as directed in the JBoss Application Server Guide and release notes. By default, the JBoss AS installer gives users the ability to password protect the console manager. If the user did not use the installer, the raw JBoss services will be in a completely unconfigured state and these steps should be performed manually:

http://wiki.jboss.org/wiki/Wiki.jsp?page=SecureJBoss

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Ben Dexter.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-1036
Severity Metric: 2.25
Date Public: 2007-02-20
Date First Published: 2007-02-20
Date Last Updated: 2007-02-21 22:50 UTC
Document Revision: 32

Sponsored by CISA.