Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6839-6896-r9mx

Опубликовано: 07 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.2

Описание

A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication.

A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication.

EPSS

Процентиль: 85%
0.02633
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 6.2
redhat
10 месяцев назад

A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication.

CVSS3: 6.2
nvd
10 месяцев назад

A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication.

EPSS

Процентиль: 85%
0.02633
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-502