We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2018-10682



Description

An issue was discovered in WildFly 10.1.2.Final. It is possible for an attacker to access the administration panel on TCP port 9990 without any authentication using "anonymous" access that is automatically created. Once logged in, a misconfiguration present by default (auto-deployment) permits an anonymous user to deploy a malicious .war file, leading to remote code execution. NOTE: the vendor indicates that anonymous access is not available in the default installation; however, it remains optional because there are several use cases for it, including development environments and network architectures that have a proxy server for access control to the WildFly server

Reserved 2018-05-02 | Published 2018-05-09 | Updated 2024-08-05 | Assigner mitre

References

github.com/.../blob/master/CVE-2018-10682-CVE-2018-10683.txt

cve.org (CVE-2018-10682)

nvd.nist.gov (CVE-2018-10682)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2018-10682

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.