CVE-2019-0187 – org.apache.jmeter:apachejmeter
Package
Manager: maven
Name: org.apache.jmeter:apachejmeter
Vulnerable Version: >=0 <5.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00635 pctl0.69639
Details
Unauthenticated Remote Code Execution in Apache JMeter Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.
Metadata
Created: 2019-03-07T18:47:57Z
Modified: 2022-09-14T22:45:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/03/GHSA-wg37-7mrv-cfwm/GHSA-wg37-7mrv-cfwm.json
CWE IDs: ["CWE-327", "CWE-502"]
Alternative ID: GHSA-wg37-7mrv-cfwm
Finding: F096
Auto approve: 1