GHSA-wg37-7mrv-cfwm

Suggest an improvement
Source
https://github.com/advisories/GHSA-wg37-7mrv-cfwm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/03/GHSA-wg37-7mrv-cfwm/GHSA-wg37-7mrv-cfwm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wg37-7mrv-cfwm
Aliases
Published
2019-03-07T18:47:57Z
Modified
2023-11-08T04:00:30.554383Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Unauthenticated Remote Code Execution in Apache JMeter
Details

Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-06-16T22:00:15Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-327",
        "CWE-502"
    ]
}
References

Affected packages

Maven / org.apache.jmeter:ApacheJMeter

Package

Name
org.apache.jmeter:ApacheJMeter
View open source insights on deps.dev
Purl
pkg:maven/org.apache.jmeter/ApacheJMeter

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1

Affected versions

2.*

2.6
2.7
2.8
2.9
2.10
2.11
2.12
2.13

3.*

3.0
3.1
3.2
3.3

4.*

4.0

5.*

5.0