CVE-2018-1287:
Missing certificate validation in Apache JMeter
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/13/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.jmeter:ApacheJMeter | maven | < 4.0 | 4.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) The RMI registry was bound to a wildcard host (0.0.0.0) instead of a specific interface, and 2) RMI communication lacked SSL/TLS enforcement with certificate validation. The first vulnerable function (RemoteJMeterEngineImpl.startServer) is responsible for initializing the insecure RMI server, while the second (ClientJMeterEngine constructor) handles insecure client connections. The patch (Bugzilla 62039) introduced SSL socket factories and hostname binding, confirming these were missing in prior versions. The CWE-347 mapping further supports the lack of cryptographic verification in these functions.