Overview
- Description
- Jalios JCMS 10 allows attackers to access any part of the website and the WebDAV server with administrative privileges via a backdoor account, by using any username and the hardcoded dev password.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-798
Social media
- Hype score
- Not currently trending
Vendor comments
- JaliosJalios confirms this vulnerability which affects a plugin (extension) of Jalios JPlatform which must only be used in development environment : the DevTools Plugin. All our SaaS customer were already protected from this vulnerability as this plugin is not enabled in their production environment. All our others customers were informed of the vulnerability as soon as the official fix was available. Fixed versions of the DevTools plugin have officially been published for our customers : https://community.jalios.com/jcms/jc2_361389/en/dev-tools-plugin-8-1 We would like to thanks Ricardo José Ruiz Fernández for his responsible disclosure.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:jalios:jcms:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "342C6207-6697-4290-8DDC-2095C5CE9A36" } ], "operator": "OR" } ] } ]