GHSA-j7j7-g4ww-pxg5

Suggest an improvement
Source
https://github.com/advisories/GHSA-j7j7-g4ww-pxg5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-j7j7-g4ww-pxg5/GHSA-j7j7-g4ww-pxg5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j7j7-g4ww-pxg5
Aliases
Published
2022-05-13T01:49:40Z
Modified
2023-11-08T03:59:51.513659Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Missing certificate validation in Apache JMeter
Details

In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. This only affect those running in Distributed mode.

In distributed mode, JMeter makes an architectural assumption that it is operating on a 'safe' network. i.e. everyone with access to the network is considered trusted.

Database specific
{
    "nvd_published_at": "2018-02-14T14:29:00Z",
    "github_reviewed_at": "2022-11-04T20:38:23Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-347"
    ]
}
References

Affected packages

Maven / org.apache.jmeter:ApacheJMeter

Package

Name
org.apache.jmeter:ApacheJMeter
View open source insights on deps.dev
Purl
pkg:maven/org.apache.jmeter/ApacheJMeter

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0

Affected versions

2.*

2.6
2.7
2.8
2.9
2.10
2.11
2.12
2.13

3.*

3.0
3.1
3.2
3.3