Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2510

Опубликовано: 22 фев. 2016
Источник: redhat
CVSS3: 7.4
CVSS2: 6.8
EPSS Средний

Описание

BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.

A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6BusinessCentralAffected
Red Hat JBoss BRMS 5jbossasWill not fix
Red Hat JBoss BRMS 6BusinessCentralAffected
Red Hat JBoss Enterprise Application Platform 5.2.0bsh2Not affected
Red Hat JBoss Fuse Service Works 6CamelAffected
Red Hat JBoss Operations Network 3Core ServerNot affected
Red Hat Fuse 7.3.1camelFixedRHSA-2019:154518.06.2019
Red Hat JBoss BPMS 6.2FixedRHSA-2016:053930.03.2016
Red Hat JBoss BRMS 6.2FixedRHSA-2016:054030.03.2016
Red Hat JBoss Data Virtualization 6.2bsh2FixedRHSA-2016:113526.05.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1310647bsh2: remote code execution via deserialization

EPSS

Процентиль: 97%
0.38909
Средний

7.4 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 10 лет назад

BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.

CVSS3: 8.1
nvd
почти 10 лет назад

BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.

CVSS3: 8.1
debian
почти 10 лет назад

BeanShell (bsh) before 2.0b6, when included on the classpath by an app ...

suse-cvrf
почти 10 лет назад

Security update for bsh2

suse-cvrf
почти 10 лет назад

Security update for bsh2

EPSS

Процентиль: 97%
0.38909
Средний

7.4 High

CVSS3

6.8 Medium

CVSS2