Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-17191

Опубликовано: 31 дек. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5
CVSS3: 9.8

Описание

Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.

РелизСтатусПримечание
bionic

not-affected

10.0-3~18.04.1ubuntu1
cosmic

not-affected

10.0-3~18.04.1ubuntu1
devel

not-affected

10.0-3
disco

not-affected

10.0-3
eoan

not-affected

10.0-3
esm-apps/bionic

not-affected

10.0-3~18.04.1ubuntu1
esm-apps/focal

not-affected

10.0-3
esm-apps/jammy

not-affected

10.0-3
esm-apps/noble

not-affected

10.0-3
esm-apps/xenial

needed

Показывать по

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 7 лет назад

Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.

CVSS3: 9.8
debian
около 7 лет назад

Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PA ...

CVSS3: 9.8
github
больше 3 лет назад

Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость файла конфигурации Proxy Auto-Configuration (PAC) среды разработки приложений Apache NetBeans, позволяющая нарушителю выполнить произвольный код

7.5 High

CVSS2

9.8 Critical

CVSS3