Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12149

Опубликовано: 30 авг. 2017
Источник: redhat
CVSS3: 9.8
EPSS Критический

Описание

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

It was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization. This allows an attacker to execute arbitrary code via crafted serialized data.

Отчет

Red Hat JBoss Enterprise Application Platform 6 and 7 do not ship the http invoker so they are not affected.

Меры по смягчению последствий

Secure the access to the entire http-invoker contexts by adding /* to the security-constraints in the web.xml file of the http-invoker.sar.The users who do not wish to use the http-invoker.sar can remove it.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 6eap-parentNot affected
Red Hat JBoss Enterprise Application Platform 7eap-parentNot affected
Red Hat JBoss Enterprise Application Platform 5.2 security updateeap-parentFixedRHSA-2018:160817.05.2018
Red Hat JBoss Enterprise Application Platform 5 for RHEL 5jbossasFixedRHSA-2018:160717.05.2018
Red Hat JBoss Enterprise Application Platform 5 for RHEL 6jbossasFixedRHSA-2018:160717.05.2018

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1486220jbossas: Arbitrary code execution via unrestricted deserialization in ReadOnlyAccessFilter of HTTP Invoker.

EPSS

Процентиль: 100%
0.94294
Критический

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

CVSS3: 9.8
nvd
больше 8 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

CVSS3: 9.8
debian
больше 8 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Applica ...

CVSS3: 9.8
github
больше 3 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

CVSS3: 9.8
fstec
больше 8 лет назад

Уязвимость метода doFilter в ReadOnlyAccessFilter HTTP платформы JBoss Enterprise Application Platform, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94294
Критический

9.8 Critical

CVSS3