[CVE-2020-1952] Apache IoTDB (incubating) Remote Code execution vulnerability

Related Vulnerabilities: CVE-2020-1952  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
[CVE-2020-1952] Apache IoTDB (incubating)   Remote Code execution vulnerability

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: "Dawei Liu" &lt;liudw () apache org&gt;

Date: Mon, 27 Apr 2020 10:12:19 +0800 (GMT+08:00)

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
IoTDB  0.9.0 to 0.9.1
IoTDB 0.8.0 to 0.8.2

Description:
When starting IoTDB, the JMX port 31999 is exposed with no certification.
Then, clients could execute code remotely. 

Mitigation: 0.8.x, 0.9.0, and 0.9.1 users should upgrade to 0.9.2.

Example: An Attacker can execute code remotely in the IoTDB server through JMX port.

Credit:  This issue was discovered by WuXiong of QI’ANXIN YunYing Lab.

Regards,
The Apache IoTDB team
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

[CVE-2020-1952] Apache IoTDB (incubating)   Remote Code execution vulnerability Dawei Liu (Apr 27)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->