Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.
{
"binaries": [
{
"binary_name": "libnb-absolutelayout-java",
"binary_version": "8.1+dfsg2-3"
},
{
"binary_name": "libnb-apisupport3-java",
"binary_version": "8.1+dfsg2-3"
},
{
"binary_name": "libnb-ide14-java",
"binary_version": "8.1+dfsg2-3"
},
{
"binary_name": "libnb-java5-java",
"binary_version": "8.1+dfsg2-3"
},
{
"binary_name": "netbeans",
"binary_version": "8.1+dfsg2-3"
}
]
}