Description
The admin terminal in Hawt.io does not require authentication, which allows remote attackers to execute arbitrary commands via the k parameter.
Remediation
References
https://bugzilla.redhat.com/show_bug.cgi?id=1072716
https://github.com/hawtio/hawtio/commit/5289715e4f2657562fdddcbad830a30969b96e1e
https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdf
Related Vulnerabilities
CVE-2018-14042 Vulnerability in npm package bootstrap
CVE-2022-24891 Vulnerability in maven package org.owasp.esapi:esapi
CVE-2020-25640 Vulnerability in maven package org.jboss.genericjms:generic-jms-ra-jar
CVE-2022-28220 Vulnerability in maven package org.apache.james.protocols:protocols-api
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-elasticsearch