PT-2017-4235 · Red Hat · Red Hat Jboss Application Server+1
Joao F M Figueiredo
·
Published
2017-08-30
·
Updated
2025-10-22
·
CVE-2017-12149
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Red Hat JBoss Application Server versions as shipped with Red Hat Enterprise Application Platform 5.2
Description
The issue is related to the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker, which does not restrict classes for which it performs deserialization. This allows an attacker to execute arbitrary code via crafted serialized data. The vulnerability is associated with the restoration of untrusted data in memory, potentially enabling a remote attacker to execute arbitrary code using specially formed serialized data.
Recommendations
For Red Hat JBoss Application Server versions as shipped with Red Hat Enterprise Application Platform 5.2, consider disabling the
doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker as a temporary workaround until a patch is available. Restrict access to the HTTP Invoker to minimize the risk of exploitation. Avoid using crafted serialized data in the affected application server until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Red Hat Jboss Enterprise Application Platform
Red Hat Jboss Application Server