Логотип exploitDog
bind:CVE-2023-37895
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-37895

Количество 5

Количество 5

ubuntu логотип

CVE-2023-37895

больше 2 лет назад

Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI. Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore. In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases. How to check whether RMI support is enabledRMI support can be o...

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2023-37895

больше 2 лет назад

Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI. Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore. In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases. How to check whether RMI support is enabledRMI support can be o

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-37895

больше 2 лет назад

Java object deserialization issue in Jackrabbit webapp/standalone on a ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-q8cm-3v62-jj79

больше 2 лет назад

Remote code execution in Apache Jackrabbit

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-06209

больше 2 лет назад

Уязвимость компонента commons-beanutils хранилища содержимого с открытым исходным кодом для платформы Java Apache Jackrabbit, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-37895

Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI. Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore. In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases. How to check whether RMI support is enabledRMI support can be o...

CVSS3: 9.8
9%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-37895

Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI. Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore. In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases. How to check whether RMI support is enabledRMI support can be o

CVSS3: 9.8
9%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-37895

Java object deserialization issue in Jackrabbit webapp/standalone on a ...

CVSS3: 9.8
9%
Низкий
больше 2 лет назад
github логотип
GHSA-q8cm-3v62-jj79

Remote code execution in Apache Jackrabbit

CVSS3: 9.8
9%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-06209

Уязвимость компонента commons-beanutils хранилища содержимого с открытым исходным кодом для платформы Java Apache Jackrabbit, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
9%
Низкий
больше 2 лет назад

Уязвимостей на страницу