6.5
CVSSv2

CVE-2014-9000

Published: 20/11/2014 Updated: 20/11/2014
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrary code via a crafted request that adds a new user. NOTE: this issue was originally reported for ESB Runtime 3.5.1, but it originates in MMC.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mulesoft mule enterprise management console -

Exploits

Mulesoft ESB Runtime 351 Authenticated Privilege Escalation → Remote Code Execution Mulesoft ESB Runtime 351 allows any arbitrary authenticated user to create an administrator user due to a lack of permissions check in the handler/securityServicerpc endpoint The following HTTP request can be made by any authenticated user, even those wi ...