Vulnerability CVE-2013-1777


Published: 2013-07-11   Modified: 2013-07-13

Description:
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.

See advisories in our WLB2 database:
Topic
Author
Date
High
Apache Geronimo 3 RMI classloader exposure
Pierre Ernst
01.07.2013

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
IBM -> Websphere application server 
Apache -> Geronimo 

 References:
http://www-01.ibm.com/support/docview.wss?uid=swg21643282
https://issues.apache.org/jira/browse/GERONIMO-6477
http://geronimo.apache.org/30x-security-report.html
http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html

Copyright 2024, cxsecurity.com

 

Back to Top