Vulnerability Description
Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrary code via a crafted request that adds a new user. NOTE: this issue was originally reported for ESB Runtime 3.5.1, but it originates in MMC.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mulesoft | Mule Enterprise Management Console | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/128799Exploit
- http://seclists.org/fulldisclosure/2014/Oct/107Exploit
- http://seclists.org/fulldisclosure/2014/Oct/98Exploit
- http://www.mulesoft.org/documentation/display/current/Mule+Enterprise+ManagementVendor Advisory
- http://packetstormsecurity.com/files/128799Exploit
- http://seclists.org/fulldisclosure/2014/Oct/107Exploit
- http://seclists.org/fulldisclosure/2014/Oct/98Exploit
- http://www.mulesoft.org/documentation/display/current/Mule+Enterprise+ManagementVendor Advisory
FAQ
What is CVE-2014-9000?
CVE-2014-9000 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrar...
How severe is CVE-2014-9000?
CVE-2014-9000 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9000?
Check the references section above for vendor advisories and patch information. Affected products include: Mulesoft Mule Enterprise Management Console.