logo

CVE-2019-0187 org.apache.jmeter:apachejmeter

Package

Manager: maven
Name: org.apache.jmeter:apachejmeter
Vulnerable Version: >=0 <5.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00635 pctl0.69639

Details

Unauthenticated Remote Code Execution in Apache JMeter Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.

Metadata

Created: 2019-03-07T18:47:57Z
Modified: 2022-09-14T22:45:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/03/GHSA-wg37-7mrv-cfwm/GHSA-wg37-7mrv-cfwm.json
CWE IDs: ["CWE-327", "CWE-502"]
Alternative ID: GHSA-wg37-7mrv-cfwm
Finding: F096
Auto approve: 1