CVE-2013-1777
Published Jul 11, 2013
Last updated 11 years ago
Overview
- Description
- The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86DD5507-6CC0-4A15-A439-DACE3FF7CA45" }, { "criteria": "cpe:2.3:a:apache:geronimo:3.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70CA9733-1982-4F17-9491-88031934DC5D" }, { "criteria": "cpe:2.3:a:apache:geronimo:3.0:m1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5D93565-3338-4F68-987D-1E563F90A552" }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:3.0.0.3:-:community:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24AF96DE-D8DE-497E-9413-256E8C9977E0" } ], "operator": "OR" } ] } ]