8.1
CVSSv3

CVE-2018-1000130

Published: 14/03/2018 Updated: 08/03/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 in the proxy mode that allows a remote malicious user to run arbitrary Java code on the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jolokia webarchive agent 1.3.7

Vendor Advisories

Synopsis Important: Fuse 71 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat FuseRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed s ...
A JNDI Injection vulnerability exists in Jolokia agent version 137 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server ...

Github Repositories

Jolokia 100 JNDI Injection leading to RCE (CVE-2018-1000130) Working POC code for Jolokia RCE Steps to Reproduce: Clone the current Repository Edit the java file src/main/java/ExportObjectjava and enter the command that you wish to execute remotely Execute mvn clean install to build the jar file Execute java -jar RMIServer-010jar <server_ip>:port