Vulnerability Description
Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Jmeter | 4.0 |
Related Weaknesses (CWE)
References
- http://mail-archives.apache.org/mod_mbox/jmeter-user/201903.mbox/%3CCAH9fUpaUQaFMailing ListVendor Advisory
- http://www.securityfocus.com/bid/107219Third Party AdvisoryVDB Entry
- http://mail-archives.apache.org/mod_mbox/jmeter-user/201903.mbox/%3CCAH9fUpaUQaFMailing ListVendor Advisory
- http://www.securityfocus.com/bid/107219Third Party AdvisoryVDB Entry
FAQ
What is CVE-2019-0187?
CVE-2019-0187 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed...
How severe is CVE-2019-0187?
CVE-2019-0187 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-0187?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Jmeter.