CVE-2021-40684
Summary
| CVE | CVE-2021-40684 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-09-22 17:15:00 UTC |
| Updated | 2022-07-12 17:42:00 UTC |
| Description | Talend ESB Runtime in all versions from 5.1 to 7.3.1-R2021-09, 7.2.1-R2021-09, 7.1.1-R2021-09, has an unauthenticated Jolokia HTTP endpoint which allows remote access to the JMX of the runtime container, which would allow an attacker the ability to read or modify the container or software running in the container. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Talend | Esb Runtime | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SF-141] [CVE-2021-40684] - Talend ESB Runtime deploys unauthenticated Jolokia by default - Talend Open Integration Solution | MISC | jira.talendforge.org | |
| Welcome to Talend Help Center | MISC | help.talend.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.