* Xen Mobile through 10.8.0 includes a service listening on port 5001 within its firewall that accepts unauthenticated input. If this service is supplied with raw serialised Java objects, it deserialises them back into Java objects in memory, giving rise to a remote code execution vulnerability. NOTE: the vendor disputes that this is a vulnerability, stating it is "already mitigated by the internal firewall that limits access to configuration services to localhost.
References
Link | Resource |
---|---|
https://advisories.dxw.com/advisories/xen-mobile-vulnerable-to-code-execution-via-object-serialisation/ | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 02:54
Type | Values Removed | Values Added |
---|---|---|
Summary | * Xen Mobile through 10.8.0 includes a service listening on port 5001 within its firewall that accepts unauthenticated input. If this service is supplied with raw serialised Java objects, it deserialises them back into Java objects in memory, giving rise to a remote code execution vulnerability. NOTE: the vendor disputes that this is a vulnerability, stating it is "already mitigated by the internal firewall that limits access to configuration services to localhost. |
Information
Published : 2018-10-24 21:29
Updated : 2024-08-05 11:15
NVD link : CVE-2018-18013
Mitre link : CVE-2018-18013
CVE.ORG link : CVE-2018-18013
JSON object : View
Products Affected
citrix
- xenmobile_server
CWE
CWE-502
Deserialization of Untrusted Data