Name | CVE-2019-0187 |
Description | Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1014709 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
jakarta-jmeter (PTS) | jessie | 2.11-2+deb8u1 | vulnerable |
| stretch | 2.13-2 | vulnerable |
| buster, bullseye | 2.13-4 | vulnerable |
| sid, bookworm | 2.13-5 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - jakarta-jmeter <no-dsa> (Minor issue)
[bullseye] - jakarta-jmeter <no-dsa> (Minor issue)
[buster] - jakarta-jmeter <no-dsa> (Minor issue)
[stretch] - jakarta-jmeter <no-dsa> (Minor issue)
[jessie] - jakarta-jmeter <no-dsa> (Minor issue)
https://bz.apache.org/bugzilla/show_bug.cgi?id=62743
http://svn.apache.org/viewvc?rev=1841383&view=rev
https://github.com/apache/jmeter/issues/4866