// For flags

CVE-2012-1154

mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

mod_cluster 1.0.10 before 1.0.10 CP03 and 1.1.x before 1.1.4, as used in JBoss Enterprise Application Platform 5.1.2, when "ROOT" is set to excludedContexts, exposes the root context of the server, which allows remote attackers to bypass access restrictions and gain access to applications deployed on the root context via unspecified vectors.

mod_cluster v1.0.10 antes de v1.0.10 CPO3 y v1.1.x antes de v1.1.4, como cuando se utiliza en JBoss Enterprise Application Platform v5.1.2, cuando se pone "ROOT" en excludedContexts, expone el contexto de root del servidor, lo que permite a atacantes remotos eludir las restricciones de acceso y obtener acceso a las aplicaciones instaladas en el contexto raíz a través de vectores no especificados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-02-14 CVE Reserved
  • 2012-06-20 CVE Published
  • 2023-09-12 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Jboss Enterprise Application Platform
Search vendor "Redhat" for product "Jboss Enterprise Application Platform"
5.1.2
Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "5.1.2"
-
Affected
Redhat
Search vendor "Redhat"
Mod Cluster
Search vendor "Redhat" for product "Mod Cluster"
1.0.10
Search vendor "Redhat" for product "Mod Cluster" and version "1.0.10"
-
Affected
Redhat
Search vendor "Redhat"
Mod Cluster
Search vendor "Redhat" for product "Mod Cluster"
1.1.0
Search vendor "Redhat" for product "Mod Cluster" and version "1.1.0"
-
Affected
Redhat
Search vendor "Redhat"
Mod Cluster
Search vendor "Redhat" for product "Mod Cluster"
1.1.1
Search vendor "Redhat" for product "Mod Cluster" and version "1.1.1"
-
Affected
Redhat
Search vendor "Redhat"
Mod Cluster
Search vendor "Redhat" for product "Mod Cluster"
1.1.2
Search vendor "Redhat" for product "Mod Cluster" and version "1.1.2"
-
Affected
Redhat
Search vendor "Redhat"
Mod Cluster
Search vendor "Redhat" for product "Mod Cluster"
1.1.3
Search vendor "Redhat" for product "Mod Cluster" and version "1.1.3"
-
Affected
Redhat
Search vendor "Redhat"
Mod Cluster
Search vendor "Redhat" for product "Mod Cluster"
1.1.4
Search vendor "Redhat" for product "Mod Cluster" and version "1.1.4"
-
Affected