Описание
An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter.
A flaw was found in glazedlists, which permits code execution when deserializing code via the BeanXMLByteDecoder's decode method. This flaw allows an attacker to execute code on the vulnerable system.
Отчет
Red Hat Process Automation Manager, Red Hat Decision Manager, and Red Hat Build of Optaplanner have build dependencies on the affected component, but none of them ship the vulnerable code, and as such, they are not affected by this flaw.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat build of OptaPlanner 8 | drools | Not affected | ||
| Red Hat Decision Manager 7 | drools | Not affected | ||
| Red Hat Process Automation 7 | drools | Not affected |
Показывать по
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter.
7.5 High
CVSS3