CVE-2009-4189
Apache Tomcat Manager - Application Deployer (Authenticated) Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
HP Operations Manager has a default password of OvW*busr1 for the ovwebusr account, which allows remote attackers to execute arbitrary code via a session that uses the manager role to conduct unrestricted file upload attacks against the /manager servlet in the Tomcat servlet container. NOTE: this might overlap CVE-2009-3099 and CVE-2009-3843.
HP Operations Manager tiene una contraseña por defecto "OvW*busr1" para la cuenta ovwebusr, lo qwue permite a atacantes remotos ejecutar código arbitrario a través de una sesión que utilice el perfil de manager para dirigir una subida de ficheros sin restricción contra el manager del servlet en el repositorio de servlet en Tomcat. NOTA: Esta vulnerabilidad podría solaparse con CVE-2009-3099 y CVE-2009-3843.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-12-03 CVE Reserved
- 2009-12-03 CVE Published
- 2010-12-14 First Exploit
- 2024-09-16 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-255: Credentials Management Errors
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.intevydis.com/blog/?p=87 | X_refsource_misc | |
http://www-01.ibm.com/support/docview.wss?uid=swg21419179 | ||
http://tomcat.apache.org/tomcat-5.5-doc/manager-howto.html |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16317 | 2010-12-14 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hp Search vendor "Hp" | Operations Manager Search vendor "Hp" for product "Operations Manager" | * | - |
Affected
|