The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html - | |
References | () http://geronimo.apache.org/30x-security-report.html - Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21643282 - Patch, Vendor Advisory | |
References | () https://issues.apache.org/jira/browse/GERONIMO-6477 - |
Information
Published : 2013-07-11 22:55
Updated : 2024-11-21 01:50
NVD link : CVE-2013-1777
Mitre link : CVE-2013-1777
CVE.ORG link : CVE-2013-1777
JSON object : View
Products Affected
apache
- geronimo
ibm
- websphere_application_server
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')