Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-8648

Опубликовано: 24 нояб. 2016
Источник: redhat
CVSS3: 7.2
CVSS2: 6.5
EPSS Низкий

Описание

It was found that the Karaf container used by Red Hat JBoss Fuse 6.x, and Red Hat JBoss A-MQ 6.x, deserializes objects passed to MBeans via JMX operations. An attacker could use this flaw to execute remote code on the server as the user running the Java Virtual Machine if the target MBean contain deserialization gadgets in its classpath.

Меры по смягчению последствий

In order to exploit this issue you need to have credentials of a user with the 'admin' role. Therefore a good mitigation against this attack is to set a strong password for any user with the 'admin' role in the 'etc/users.properties' file of the Red Hat JBoss Fuse 6, or Red Hat JBoss AM-Q 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss A-MQ 6KarafAffected
Red Hat JBoss Fuse 6karafAffected
Red Hat OpenStack Platform 8 (Liberty)opendaylightNot affected
Red Hat OpenStack Platform 9 (Mitaka)opendaylightNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1395077Karaf JMX Console RCE during deserialization

EPSS

Процентиль: 67%
0.00536
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.2
nvd
больше 7 лет назад

It was found that the Karaf container used by Red Hat JBoss Fuse 6.x, and Red Hat JBoss A-MQ 6.x, deserializes objects passed to MBeans via JMX operations. An attacker could use this flaw to execute remote code on the server as the user running the Java Virtual Machine if the target MBean contain deserialization gadgets in its classpath.

CVSS3: 7.2
github
больше 3 лет назад

It was found that the Karaf container used by Red Hat JBoss Fuse 6.x, and Red Hat JBoss A-MQ 6.x, deserializes objects passed to MBeans via JMX operations. An attacker could use this flaw to execute remote code on the server as the user running the Java Virtual Machine if the target MBean contain deserialization gadgets in its classpath.

EPSS

Процентиль: 67%
0.00536
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2