jolokia is vulnerable to cross-site request forgery (CSRF). The backend manager does not properly handle the strict checking for origin and referrer header, causing a system-wide CSRF which subsequently allows a remote code execution.
lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html
lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
www.securityfocus.com/bid/107834
bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10899
code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b16fea2f175a3297edac118c8844c7987d31c1cb
github.com/rhuss/jolokia/commit/ec1cebda618e68d12c9b1906820564408cf950e1
jolokia.org/changes-report.html#a1.6.1
lists.debian.org/debian-lts-announce/2019/05/msg00034.html
lists.debian.org/debian-lts-announce/2020/10/msg00036.html
lists.fedoraproject.org/archives/list/[email protected]/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/
lists.fedoraproject.org/archives/list/[email protected]/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/
usn.ubuntu.com/3986-1/
www.wireshark.org/security/wnpa-sec-2019-10.html