<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vulnerability in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146606#M32628</link>
    <description>&lt;P&gt;Please check &lt;A href="https://security.netapp.com/advisory/" target="_blank"&gt;https://security.netapp.com/advisory/&lt;/A&gt;. If it's not listed here, I'd open a Support case.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Feb 2019 15:22:46 GMT</pubDate>
    <dc:creator>paul_stejskal</dc:creator>
    <dc:date>2019-02-13T15:22:46Z</dc:date>
    <item>
      <title>vulnerability</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146562#M32611</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking for solution for vurnabilities please check attached file for details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NetApp Release 8.2.3P3 7-Mode: Tue Apr 28 14:48:22 PDT 2015&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The 'EBJInvokerServlet' and 'JMXInvokerServlet' servlets hosted on the web server on the remote host are accessible to unauthenticated users. The remote host is, therefore, affected by the following vulnerabilities :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - A security bypass vulnerability exists due to improper&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; restriction of access to the console and web management&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interfaces. An unauthenticated, remote attacker can&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exploit this, via direct requests, to bypass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication and gain administrative access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (CVE-2007-1036)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - A remote code execution vulnerability exists due to the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; JMXInvokerHAServlet and EJBInvokerHAServlet invoker&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; servlets not properly restricting access to profiles. An&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unauthenticated, remote attacker can exploit this to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; bypass authentication and invoke MBean methods,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; resulting in the execution of arbitrary code.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (CVE-2012-0874)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - A remote code execution vulnerability exists in the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EJBInvokerServlet and JMXInvokerServlet servlets due to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; the ability to post a marshalled object. An&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unauthenticated, remote attacker can exploit this, via a&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; specially crafted request, to install arbitrary&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; applications. Note that this issue is known to affect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; McAfee Web Reporter versions prior to or equal to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; version 5.2.1 as well as Symantec Workspace Streaming&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; version 7.5.0.493 and possibly earlier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (CVE-2013-4810)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;Prajyot Katakdound&lt;/P&gt;
&lt;P&gt;prajyot.katakdound.wg@hitachi-systems.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 12:50:18 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146562#M32611</guid>
      <dc:creator>prajyot123</dc:creator>
      <dc:date>2025-06-04T12:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146563#M32612</link>
      <description>&lt;P&gt;Time to upgrade to 8.2.5p2&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 13:36:32 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146563#M32612</guid>
      <dc:creator>JGPSHNTAP</dc:creator>
      <dc:date>2019-02-12T13:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146574#M32617</link>
      <description>&lt;P&gt;Thank you very much&amp;nbsp; team , but could you also&amp;nbsp; help me with any technote which could justify the same&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;Prajyot Katakdound&lt;/P&gt;
&lt;P&gt;prajyot.katakdound.wg@hitachi-systems.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 07:47:54 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146574#M32617</guid>
      <dc:creator>prajyot123</dc:creator>
      <dc:date>2019-02-13T07:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146606#M32628</link>
      <description>&lt;P&gt;Please check &lt;A href="https://security.netapp.com/advisory/" target="_blank"&gt;https://security.netapp.com/advisory/&lt;/A&gt;. If it's not listed here, I'd open a Support case.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 15:22:46 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146606#M32628</guid>
      <dc:creator>paul_stejskal</dc:creator>
      <dc:date>2019-02-13T15:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146611#M32630</link>
      <description>&lt;DIV class="BubbleStyle_MessagesContainer"&gt;A support case is the recommended action to resolve items from a scanner report.&lt;BR /&gt;&lt;BR /&gt;Anyone prioritizing security for 7-Mode ONTAP should be targeting the latest P release of 8.2.5.&lt;BR /&gt;&lt;BR /&gt;These CVEs cover JBoss and HP ProCurve Manager, none of which is shipped in ONTAP.&lt;BR /&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2007-1036" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2007-1036&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2012-0874" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2012-0874&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2013-4810" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2013-4810&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 13 Feb 2019 16:45:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/vulnerability/m-p/146611#M32630</guid>
      <dc:creator>kryan</dc:creator>
      <dc:date>2019-02-13T16:45:01Z</dc:date>
    </item>
  </channel>
</rss>

