CVE-2017-15708Injection in Software Foundation Apache Synapse

Severity
9.8CRITICALNVD
EPSS
19.9%
top 4.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 11
Latest updateNov 4

Description

In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI a

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

🔴Vulnerability Details

3
GHSA
Remote Code Execution in Apache Synapse2020-11-04
OSV
Remote Code Execution in Apache Synapse2020-11-04
CVEList
CVE-2017-15708: In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI)2017-12-11

📋Vendor Advisories

2
Oracle
Oracle Oracle Financial Services Applications Risk Matrix: User Interface (Apache Synapse) — CVE-2017-157082020-07-15
Oracle
Oracle Oracle PeopleSoft Risk Matrix: Portal (Apache Commons) — CVE-2017-157082020-01-15