Unsecured RMI Connection in Apache JMeter Affects Remote Testing Processes
CVE-2018-1297

9.8CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
13 February 2018

Badges

👾 Exploit Exists🟡 Public PoC

Summary

Apache JMeter versions 2.x and 3.x contain a vulnerability that allows for unauthorized access to the JMeter Engine due to the utilization of an unsecure Remote Method Invocation (RMI) connection in distributed test scenarios. An attacker can exploit this vulnerability to execute unauthorized code, potentially compromising the integrity of testing processes and the security of the underlying system.

Affected Version(s)

Apache JMeter 2.x

Apache JMeter 3.x

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.