Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-12149

Опубликовано: 04 окт. 2017
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS2: 7.5
CVSS3: 9.8

Описание

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was needs-triage
upstream

needs-triage

Показывать по

EPSS

Процентиль: 100%
0.94294
Критический

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
больше 8 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

CVSS3: 9.8
nvd
больше 8 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

CVSS3: 9.8
debian
больше 8 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Applica ...

CVSS3: 9.8
github
больше 3 лет назад

In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.

CVSS3: 9.8
fstec
больше 8 лет назад

Уязвимость метода doFilter в ReadOnlyAccessFilter HTTP платформы JBoss Enterprise Application Platform, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94294
Критический

7.5 High

CVSS2

9.8 Critical

CVSS3