René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

138 lines
4.1 KiB
JSON

{
"id": "CVE-2017-3207",
"sourceIdentifier": "cret@cert.org",
"published": "2018-06-11T17:29:00.773",
"lastModified": "2019-10-09T23:27:23.213",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Java implementations of AMF3 deserializers in WebORB for Java by Midnight Coders, version 5.1.1.0, derive class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialized Java objects that execute arbitrary code when deserialized."
},
{
"lang": "es",
"value": "Las implementaciones de Java de los deserializadores AMF3 empleados en WebORB for Java, de Midnight Coders, en su versi\u00f3n 5.1.1.0, deriva las instancias de clase desde java.io.Externalizable en lugar de la recomendaci\u00f3n de especificaci\u00f3n de AMF3 de flash.utils.IExternalizable. Un atacante remoto con la habilidad de suplantar o controlar una conexi\u00f3n de servidor RMI podr\u00eda ser capaz de enviar objetos Java serializados que ejecutan c\u00f3digo arbitrario al deserializarse."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themidnightcoders:weborb_for_java:5.1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C73FA9F1-CBF3-4C48-9D1B-C19D66B274E2"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/97384",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://codewhitesec.blogspot.com/2017/04/amf.html",
"source": "cret@cert.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/307983",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}