The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html - Third Party Advisory, VDB Entry | |
References | () http://tomee-openejb.979440.n4.nabble.com/Document-resolved-vulnerability-CVE-2015-8581-td4678073.html - Issue Tracking | |
References | () http://tomee.apache.org/security/tomee.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/537806/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/79204 - Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-15-638 - Third Party Advisory, VDB Entry |
Information
Published : 2017-04-11 16:59
Updated : 2024-11-21 02:42
NVD link : CVE-2016-0779
Mitre link : CVE-2016-0779
CVE.ORG link : CVE-2016-0779
JSON object : View
Products Affected
apache
- tomee
CWE
CWE-502
Deserialization of Untrusted Data