Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9606

Опубликовано: 15 дек. 2016
Источник: redhat
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.

It was discovered that under certain conditions RESTEasy could be forced to parse a request with YamlProvider, resulting in unmarshalling of potentially untrusted data. An attacker could possibly use this flaw execute arbitrary code with the permissions of the application using RESTEasy.

Отчет

YamlProvider was removed the default list of providers to prevent a malicous user from requesting a payload be marshalled with Yaml. If marshalling of Yaml content is desired, add, or append a file with the name 'META-INF/services/javax.ws.rs.ext.Providers' to your WAR, or JAR with the contents 'org.jboss.resteasy.plugins.providers.YamlProvider' If YamlProvider is re-added to the default list of providers it's recommended to add authentication, and authorization to the endpoint expecting Yaml content to prevent exploitation of this vulnerablilty.

Меры по смягчению последствий

Add authentication and authorization to any Resteasy endpoint which doesn't define a mime type, or defines a multipart mime type.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6resteasyAffected
Red Hat Enterprise Linux 7resteasy-baseNot affected
Red Hat JBoss BRMS 6resteasyAffected
Red Hat JBoss Fuse 6resteasyNot affected
Red Hat JBoss Operations Network 3resteasyNot affected
Red Hat JBoss Portal Platform 6.2resteasyNot affected
Red Hat Mobile Application Platform 4millicoreNot affected
Red Hat Single Sign-On 7resteasyNot affected
Red Hat JBoss BPMS 6.4FixedRHSA-2017:167504.07.2017
Red Hat JBoss BPMS 7.1FixedRHSA-2018:290911.10.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1400644Resteasy: Yaml unmarshalling vulnerable to RCE

EPSS

Процентиль: 82%
0.01752
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 8 лет назад

JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.

CVSS3: 8.1
nvd
почти 8 лет назад

JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.

CVSS3: 8.1
debian
почти 8 лет назад

JBoss RESTEasy before version 3.1.2 could be forced into parsing a req ...

CVSS3: 8.1
github
больше 3 лет назад

JBoss RESTEasy vulnerable to Improper Input Validation

CVSS3: 8.1
fstec
около 9 лет назад

Уязвимость компонента YamlProvider программного средства RESTEasy, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 82%
0.01752
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2