CVE-2018-17191

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-17191
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-17191.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-17191
Related
Published
2018-12-31T14:29:00Z
Modified
2025-01-14T07:25:50.111945Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.

References

Affected packages

Debian:11 / netbeans

Package

Name
netbeans
Purl
pkg:deb/debian/netbeans?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / netbeans

Package

Name
netbeans
Purl
pkg:deb/debian/netbeans?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / netbeans

Package

Name
netbeans
Purl
pkg:deb/debian/netbeans?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/apache/netbeans

Affected ranges

Type
GIT
Repo
https://github.com/apache/netbeans
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

9.*

9.0
9.0-alpha-rc2
9.0-beta-rc1
9.0-beta-rc2
9.0-beta-rc3
9.0-rc1-rc1
9.0-vc2
9.0-vc3