Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 does not check the JON agent key, which allows remote attackers to spoof the identity of arbitrary agents via the registered agent name.
2014-02-14T15:55:04.750
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:N
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | jboss_operations_network | ≤ 2.4.1 | Yes |
Application | redhat | jboss_operations_network | 2.0.0 | Yes |
Application | redhat | jboss_operations_network | 2.0.1 | Yes |
Application | redhat | jboss_operations_network | 2.1.0 | Yes |
Application | redhat | jboss_operations_network | 2.2 | Yes |
Application | redhat | jboss_operations_network | 2.3 | Yes |
Application | redhat | jboss_operations_network | 2.3.1 | Yes |
Application | redhat | jboss_operations_network | 2.4 | Yes |
Application | redhat | jboss_operations_network | 3.0 | Yes |