Hawt

Hawtio

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Published 01.06.2023 13:15:10
  • Last modified 09.01.2025 17:15:09

hawtio 2.17.2 is vulnerable to Path Traversal. it is possible to input malicious zip files, which can result in the high-risk files after decompression being stored in any location, even leading to file overwrite.

Exploit
  • EPSS 4.59%
  • Published 03.07.2019 21:15:10
  • Last modified 21.11.2024 04:52:23

Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.

  • EPSS 0.18%
  • Published 26.07.2018 15:29:00
  • Last modified 21.11.2024 03:23:47

It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that pro...

  • EPSS 0.7%
  • Published 22.05.2018 17:29:00
  • Last modified 05.08.2025 14:35:48

hawtio before version 1.5.5 is vulnerable to remote code execution via file upload. An attacker could use this vulnerability to upload a crafted file which could be executed on a target machine where hawtio is deployed.

  • EPSS 2.07%
  • Published 08.05.2018 17:29:00
  • Last modified 21.11.2024 03:23:47

hawtio before versions 2.0-beta-1, 2.0-beta-2 2.0-m1, 2.0-m2, 2.0-m3, and 1.5 is vulnerable to a path traversal that leads to a NullPointerException with a full stacktrace. An attacker could use this flaw to gather undisclosed information from within...

  • EPSS 0.15%
  • Published 29.12.2017 22:29:00
  • Last modified 20.04.2025 01:37:25

Cross-site request forgery (CSRF) vulnerability in the admin terminal in Hawt.io allows remote attackers to hijack the authentication of arbitrary users for requests that run commands on the Karaf server, as demonstrated by running "shutdown -f."

  • EPSS 1.53%
  • Published 29.12.2017 22:29:00
  • Last modified 20.04.2025 01:37:25

The admin terminal in Hawt.io does not require authentication, which allows remote attackers to execute arbitrary commands via the k parameter.

  • EPSS 0.25%
  • Published 17.08.2017 19:29:00
  • Last modified 20.04.2025 01:37:25

Hawtio versions up to and including 1.5.3 are vulnerable to CSRF vulnerability allowing remote attackers to trick the user to visit their website containing a malicious script which can be submitted to hawtio server on behalf of the user.