CVE-2017-12149

Published Oct 4, 2017

Last updated 4 months ago

Overview

Description
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
Source
secalert@redhat.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
Red Hat JBoss Application Server Remote Code Execution Vulnerability
Exploit added on
Dec 10, 2021
Exploit action due
Jun 10, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-502
secalert@redhat.com
CWE-502

Social media

Hype score
Not currently trending

Configurations