Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-3690

Опубликовано: 13 июн. 2016
Источник: redhat
CVSS2: 7.5
EPSS Низкий

Описание

The PooledInvokerServlet in JBoss EAP 4.x and 5.x allows remote attackers to execute arbitrary code via a crafted serialized payload.

It was discovered that the LegacyInvokerServlet is exposed on all network interfaces and deserializes objects sent to it. An attacker could use this flaw to cause remote code execution in the JVM running it.

Меры по смягчению последствий

The PooledInvokerServlet is no longer required and can be removed by following the details in this knowledgebase solution: https://access.redhat.com/solutions/178393

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss BRMS 5jbossasWill not fix
Red Hat JBoss Enterprise Application Platform 4jbossasWill not fix
Red Hat JBoss Enterprise Application Platform 5jbossasWill not fix
Red Hat JBoss SOA Platform 4JBossASWill not fix
Red Hat JBoss SOA Platform 5JBossASWill not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1327037PooledInvokerServlet is not secured, and deserializes data

EPSS

Процентиль: 83%
0.01894
Низкий

7.5 High

CVSS2

Связанные уязвимости

CVSS3: 9.8
nvd
больше 8 лет назад

The PooledInvokerServlet in JBoss EAP 4.x and 5.x allows remote attackers to execute arbitrary code via a crafted serialized payload.

CVSS3: 9.8
github
больше 3 лет назад

The PooledInvokerServlet in JBoss EAP 4.x and 5.x allows remote attackers to execute arbitrary code via a crafted serialized payload.

EPSS

Процентиль: 83%
0.01894
Низкий

7.5 High

CVSS2