FKIE_CVE-2009-4188
Vulnerability from fkie_nvd - Published: 2009-12-03 17:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
HP Operations Dashboard has a default password of j2deployer for the j2deployer account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3098.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hp | operations_dashboard | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp:operations_dashboard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF450251-74EC-4F9A-A03A-0496BB805D77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HP Operations Dashboard has a default password of j2deployer for the j2deployer account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3098."
},
{
"lang": "es",
"value": "HP Operations Dashboard tiene una contrase\u00f1a por defecto \"j2deployer\" en la cuenta j2deployer, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a atraves de una sesi\u00f3n que utilice el perfil manager para dirigir ataque de subida de ficheros sin restricci\u00f3n contra el servlet de manager en el repositorio de servlets de Tomcat. NOTA: Esta vulnerabilidad podria solaparse con CVE-2009-3098."
}
],
"id": "CVE-2009-4188",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-12-03T17:30:02.233",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.intevydis.com/blog/?p=87"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/36258"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.intevydis.com/blog/?p=87"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/36258"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-255"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…