CVE-2013-1777: Improper Control of Generation of Code ('Code Injection')
(updated )
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
References
- archives.neohapsis.com/archives/bugtraq/2013-07/0008.html
- geronimo.apache.org/30x-security-report.html
- svn.apache.org/viewvc/geronimo/server/trunk
- svn.apache.org/viewvc?view=revision&revision=1458113
- www-01.ibm.com/support/docview.wss?uid=swg21643282
- github.com/advisories/GHSA-v64w-96p6-fx7w
- issues.apache.org/jira/browse/GERONIMO-6477
- nvd.nist.gov/vuln/detail/CVE-2013-1777
Detect and mitigate CVE-2013-1777 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →