Arbitrary Code Execution via Unauthenticated JMX Access in Symmetric DS <3.12.0

Arbitrary Code Execution via Unauthenticated JMX Access in Symmetric DS <3.12.0

CVE-2020-24231 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Symmetric DS <3.12.0 uses mx4j to provide access to JMX over HTTP. mx4j, by default, has no auth and is available on all interfaces. An attacker can interact with JMX: get system info, and invoke MBean methods. It is possible to install additional MBeans from a remote host using MLet that leads to arbitrary code execution.

Learn more about our Web Application Penetration Testing UK.