⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-06-10.
CVE-2017-12149 — Deserialization of Untrusted Data in Redhat Jboss Enterprise Application Platform
Severity
9.8CRITICALNVD
EPSS
94.3%
top 0.06%
CISA KEV
KEVRansomware
Added 2021-12-10
Due 2022-06-10
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 4
KEV addedDec 10
KEV dueJun 10
Latest updateMay 29
CISA Required Action: Apply updates per vendor instructions.
Description
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3💥Exploits & PoCs
2Nuclei▶
Jboss Application Server - Remote Code Execution
🔍Detection Rules
1📋Vendor Advisories
2🕵️Threat Intelligence
6📄Research Papers
1💬Community
1Bugzilla▶
CVE-2017-12149 jbossas: Arbitrary code execution via unrestricted deserialization in ReadOnlyAccessFilter of HTTP Invoker.↗2017-08-29