A flaw was found in Jolokia versions from 1.2 to before 1.6.1. Affected versions are vulnerable to a system-wide CSRF. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack.
Vulnerable Library - jolokia-core-1.6.0.jar
jar file containing servlet and helper classes
Library home page: http://www.jolokia.org/jolokia-agent-parent/jolokia-core/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar
Found in HEAD commit: bf8704d43c30f97e6b81388a152e3528d45aeacf
Vulnerabilities
Unreachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2018-10899
### Vulnerable Library - jolokia-core-1.6.0.jarjar file containing servlet and helper classes
Library home page: http://www.jolokia.org/jolokia-agent-parent/jolokia-core/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar
Dependency Hierarchy: - :x: **jolokia-core-1.6.0.jar** (Vulnerable Library)
Found in HEAD commit: bf8704d43c30f97e6b81388a152e3528d45aeacf
Found in base branch: master
### Reachability AnalysisThe vulnerable code is unreachable
### Vulnerability DetailsA flaw was found in Jolokia versions from 1.2 to before 1.6.1. Affected versions are vulnerable to a system-wide CSRF. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack.
Publish Date: 2019-08-01
URL: CVE-2018-10899
### Threat AssessmentExploit Maturity: Not Defined
EPSS: 1.0%
### CVSS 3 Score Details (8.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10899
Release Date: 2019-08-01
Fix Resolution: 1.6.1
In order to enable automatic remediation, please create workflow rules
In order to enable automatic remediation for this issue, please create workflow rules