Логотип exploitDog
bind:CVE-2021-37578
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-37578

Количество 3

Количество 3

nvd логотип

CVE-2021-37578

больше 4 лет назад

Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-9hx8-2mrv-r674

больше 4 лет назад

Deserialization of Untrusted Data in Apache jUDDI

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2021-04547

больше 4 лет назад

Уязвимость программного обеспечения Apache jUDDI, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-37578

Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.

CVSS3: 9.8
2%
Низкий
больше 4 лет назад
github логотип
GHSA-9hx8-2mrv-r674

Deserialization of Untrusted Data in Apache jUDDI

CVSS3: 9.8
2%
Низкий
больше 4 лет назад
fstec логотип
BDU:2021-04547

Уязвимость программного обеспечения Apache jUDDI, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
2%
Низкий
больше 4 лет назад

Уязвимостей на страницу