ID

VAR-201005-0325


CVE

CVE-2010-1454


TITLE

VMware SpringSource tc Server Runtime In JMX Vulnerability to gain access to the interface

Trust: 0.8

sources: JVNDB: JVNDB-2010-001996

DESCRIPTION

com.springsource.tcserver.serviceability.rmi.JmxSocketListener in VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D, and 6.0.25.A before 6.0.25.A-SR01, does not properly enforce the requirement for an encrypted (aka s2enc) password, which allows remote attackers to obtain JMX interface access via a blank password. SpringSource tc Server is a Tomcat-based web application server released by the vmware subsidiary. com.springsource.tcserver.serviceability.rmi.JmxSocketListener has security issues. If the Listener uses a password-encrypted configuration (such as adding s2enc:// before the password), then you can verify successful access to JMX regardless of whether you enter the correct password or an empty string. interface. By default, the JMX interface does not allow remote access, but it can be configured to be remotely accessible by setting the address property. An attacker can exploit this issue to bypass certain security restrictions and gain unauthorized access to the JMX interface, which may lead to further attacks. Versions prior to SpringSource tc Server runtime 6.0.20.D and 6.0.25.A-SR01 are vulnerable. Mitigation: All users are recommended to immediately switch to non-encrypted passwords for the JMX interface or to disable the JMX interface. References: [1] http://www.springsource.com/security/tc-server Mark Thomas SpringSource Security Team . ---------------------------------------------------------------------- Looking for a job? Secunia is hiring skilled researchers and talented developers. http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: SpringSource tc Server Encrypted Password Security Bypass SECUNIA ADVISORY ID: SA39778 VERIFY ADVISORY: http://secunia.com/advisories/39778/ DESCRIPTION: A vulnerability has been reported in SpringSource tc Server, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability is caused due to an error within the com.springsource.tcserver.serviceability.rmi.JmxSocketListener listener when handling encrypted passwords. This can be exploited to bypass the authentication by e.g. entering an empty password. PROVIDED AND/OR DISCOVERED BY: The vendor credits Erhan Baz, Yapi Kredi. ORIGINAL ADVISORY: http://www.springsource.com/security/cve-2010-1454 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2010-1454 // JVNDB: JVNDB-2010-001996 // CNVD: CNVD-2010-0888 // BID: 40205 // PACKETSTORM: 89655 // PACKETSTORM: 89613

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-0888

AFFECTED PRODUCTS

vendor:vmwaremodel:tc serverscope:eqversion:6.0.19

Trust: 1.6

vendor:vmwaremodel:tc serverscope:eqversion:6.0.20

Trust: 1.6

vendor:vmwaremodel:tc serverscope:eqversion:6.0.20.b

Trust: 1.6

vendor:vmwaremodel:tc serverscope:eqversion:6.0.20.c

Trust: 1.6

vendor:vmwaremodel:tc serverscope:eqversion:6.0.19.a

Trust: 1.6

vendor:vmwaremodel:tc serverscope:eqversion:6.0.25.a

Trust: 1.6

vendor:vmwaremodel:tc serverscope:eqversion:6.0.20.a

Trust: 1.6

vendor:vmwaremodel:tc serverscope:eqversion:runtime 6.0.19.a

Trust: 0.8

vendor:vmwaremodel:tc serverscope:eqversion:runtime 6.0.20.a

Trust: 0.8

vendor:vmwaremodel:tc serverscope:eqversion:runtime 6.0.20.b

Trust: 0.8

vendor:vmwaremodel:tc serverscope:eqversion:runtime 6.0.20.c

Trust: 0.8

vendor:vmwaremodel:tc serverscope:eqversion:runtime 6.0.25.a

Trust: 0.8

vendor:vmwaremodel:springsource tc server .ascope:eqversion:6.0.19

Trust: 0.6

vendor:vmwaremodel:springsource tc server .ascope:eqversion:6.0.20

Trust: 0.6

vendor:vmwaremodel:springsource tc server .a-sr1scope:eqversion:6.0.20

Trust: 0.6

vendor:vmwaremodel:springsource tc server .bscope:eqversion:6.0.20

Trust: 0.6

vendor:vmwaremodel:springsource tc server .cscope:eqversion:6.0.20

Trust: 0.6

vendor:vmwaremodel:springsource tc server .ascope:eqversion:6.0.25

Trust: 0.6

vendor:springsourcemodel:tc server .ascope:eqversion:6.0.25

Trust: 0.3

vendor:springsourcemodel:tc server .cscope:eqversion:6.0.20

Trust: 0.3

vendor:springsourcemodel:tc server .bscope:eqversion:6.0.20

Trust: 0.3

vendor:springsourcemodel:tc server .a-sr1scope:eqversion:6.0.20

Trust: 0.3

vendor:springsourcemodel:tc server .ascope:eqversion:6.0.20

Trust: 0.3

vendor:springsourcemodel:tc server .ascope:eqversion:6.0.19

Trust: 0.3

vendor:springsourcemodel:tc server .a-sr01scope:neversion:6.0.25

Trust: 0.3

vendor:springsourcemodel:tc server .dscope:neversion:6.0.20

Trust: 0.3

sources: CNVD: CNVD-2010-0888 // BID: 40205 // JVNDB: JVNDB-2010-001996 // CNNVD: CNNVD-201005-251 // NVD: CVE-2010-1454

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1454
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-1454
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201005-251
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-1454
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2010-001996 // CNNVD: CNNVD-201005-251 // NVD: CVE-2010-1454

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2010-001996 // NVD: CVE-2010-1454

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 89655 // CNNVD: CNNVD-201005-251

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201005-251

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001996

PATCH

title:CVE-2010-1454url:http://www.springsource.com/security/cve-2010-1454

Trust: 0.8

title:SpringSource tc Server JMX interface verification security bypass patchurl:https://www.cnvd.org.cn/patchInfo/show/415

Trust: 0.6

sources: CNVD: CNVD-2010-0888 // JVNDB: JVNDB-2010-001996

EXTERNAL IDS

db:NVDid:CVE-2010-1454

Trust: 3.5

db:BIDid:40205

Trust: 2.7

db:SECUNIAid:39778

Trust: 2.6

db:XFid:58684

Trust: 0.8

db:JVNDBid:JVNDB-2010-001996

Trust: 0.8

db:CNVDid:CNVD-2010-0888

Trust: 0.6

db:BUGTRAQid:20100517 CVE-2010-1454: SPRINGSOURCE TC SERVER UNAUTHENTICATED REMOTE ACCESS TO JMX INTERFACE

Trust: 0.6

db:NSFOCUSid:15045

Trust: 0.6

db:CNNVDid:CNNVD-201005-251

Trust: 0.6

db:PACKETSTORMid:89655

Trust: 0.1

db:PACKETSTORMid:89613

Trust: 0.1

sources: CNVD: CNVD-2010-0888 // BID: 40205 // JVNDB: JVNDB-2010-001996 // PACKETSTORM: 89655 // PACKETSTORM: 89613 // CNNVD: CNNVD-201005-251 // NVD: CVE-2010-1454

REFERENCES

url:http://www.springsource.com/security/cve-2010-1454

Trust: 2.6

url:http://secunia.com/advisories/39778

Trust: 2.4

url:http://www.securityfocus.com/bid/40205

Trust: 2.4

url:http://www.securityfocus.com/archive/1/511307/100/0/threaded

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/58684

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1454

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/58684

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1454

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/511307/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/15045

Trust: 0.6

url:http://www.springsource.com/

Trust: 0.3

url:/archive/1/511307

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-1454

Trust: 0.1

url:http://www.springsource.com/security/tc-server

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/39778/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-0888 // BID: 40205 // JVNDB: JVNDB-2010-001996 // PACKETSTORM: 89655 // PACKETSTORM: 89613 // CNNVD: CNNVD-201005-251 // NVD: CVE-2010-1454

CREDITS

Erhan Baz at Yapi Kredi

Trust: 0.9

sources: BID: 40205 // CNNVD: CNNVD-201005-251

SOURCES

db:CNVDid:CNVD-2010-0888
db:BIDid:40205
db:JVNDBid:JVNDB-2010-001996
db:PACKETSTORMid:89655
db:PACKETSTORMid:89613
db:CNNVDid:CNNVD-201005-251
db:NVDid:CVE-2010-1454

LAST UPDATE DATE

2025-04-11T23:15:42.515000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-0888date:2010-05-18T00:00:00
db:BIDid:40205date:2010-05-17T00:00:00
db:JVNDBid:JVNDB-2010-001996date:2010-09-13T00:00:00
db:CNNVDid:CNNVD-201005-251date:2010-05-19T00:00:00
db:NVDid:CVE-2010-1454date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-0888date:2010-05-18T00:00:00
db:BIDid:40205date:2010-05-17T00:00:00
db:JVNDBid:JVNDB-2010-001996date:2010-09-13T00:00:00
db:PACKETSTORMid:89655date:2010-05-19T04:23:49
db:PACKETSTORMid:89613date:2010-05-18T15:00:23
db:CNNVDid:CNNVD-201005-251date:2010-05-19T00:00:00
db:NVDid:CVE-2010-1454date:2010-05-19T18:30:03.553