Описание
- Xen Mobile through 10.8.0 includes a service listening on port 5001 within its firewall that accepts unauthenticated input. If this service is supplied with raw serialised Java objects, it deserialises them back into Java objects in memory, giving rise to a remote code execution vulnerability. NOTE: the vendor disputes that this is a vulnerability, stating it is "already mitigated by the internal firewall that limits access to configuration services to localhost.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.8.0 (включая)
cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
EPSS
Процентиль: 47%
0.00241
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-502
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
** DISPUTED *** Xen Mobile through 10.8.0 includes a service listening on port 5001 within its firewall that accepts unauthenticated input. If this service is supplied with raw serialised Java objects, it deserialises them back into Java objects in memory, giving rise to a remote code execution vulnerability. NOTE: the vendor disputes that this is a vulnerability, stating it is "already mitigated by the internal firewall that limits access to configuration services to localhost."
EPSS
Процентиль: 47%
0.00241
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-502