UBUNTU-CVE-2018-17191

Source
https://ubuntu.com/security/CVE-2018-17191
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17191.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-17191
Upstream
Published
2018-12-31T14:29:00Z
Modified
2025-10-24T04:47:13Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.

References

Affected packages

Ubuntu:16.04:LTS / netbeans

Package

Name
netbeans
Purl
pkg:deb/ubuntu/netbeans@8.1+dfsg2-3?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.0.2+dfsg1-4
8.0.2+dfsg1-5
8.1+dfsg1-1
8.1+dfsg2-1
8.1+dfsg2-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libnb-absolutelayout-java",
            "binary_version": "8.1+dfsg2-3"
        },
        {
            "binary_name": "libnb-apisupport3-java",
            "binary_version": "8.1+dfsg2-3"
        },
        {
            "binary_name": "libnb-ide14-java",
            "binary_version": "8.1+dfsg2-3"
        },
        {
            "binary_name": "libnb-java5-java",
            "binary_version": "8.1+dfsg2-3"
        },
        {
            "binary_name": "netbeans",
            "binary_version": "8.1+dfsg2-3"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17191.json"