GHSA-v64w-96p6-fx7w

Suggest an improvement
Source
https://github.com/advisories/GHSA-v64w-96p6-fx7w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-v64w-96p6-fx7w/GHSA-v64w-96p6-fx7w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v64w-96p6-fx7w
Aliases
  • CVE-2013-1777
Published
2022-05-17T04:48:11Z
Modified
2024-12-03T06:08:21.185199Z
Summary
Apache Geronimo JMX Remoting functionality allows remote code execution in 3.x before v3.0.1
Details

The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.

Database specific
{
    "nvd_published_at": "2013-07-11T22:55:00Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-07-27T21:38:21Z"
}
References

Affected packages

Maven / org.apache.geronimo.framework:geronimo-jmx-remoting

Package

Name
org.apache.geronimo.framework:geronimo-jmx-remoting
View open source insights on deps.dev
Purl
pkg:maven/org.apache.geronimo.framework/geronimo-jmx-remoting

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0-beta-1
Fixed
3.0.1

Affected versions

3.*

3.0-beta-1
3.0-M1
3.0.0