We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2018-10682



Assignermitre
Reserved2018-05-02
Published2018-05-09
Updated2024-08-05

Description

An issue was discovered in WildFly 10.1.2.Final. It is possible for an attacker to access the administration panel on TCP port 9990 without any authentication using "anonymous" access that is automatically created. Once logged in, a misconfiguration present by default (auto-deployment) permits an anonymous user to deploy a malicious .war file, leading to remote code execution. NOTE: the vendor indicates that anonymous access is not available in the default installation; however, it remains optional because there are several use cases for it, including development environments and network architectures that have a proxy server for access control to the WildFly server

References

https://github.com/kmkz/exploit/blob/master/CVE-2018-10682-CVE-2018-10683.txt

cve.org CVE-2018-10682

nvd.nist.gov CVE-2018-10682

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2018-10682
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.