FYI...
Apache Commons Collections Java library insecurely deserializes data
- https://blogs.oracle...t_cve_2015_4852
Nov 10, 2015 - "This Security Alert addresses security issue CVE-2015-4852, a deserialization vulnerability involving Apache Commons and Oracle WebLogic Server. This is a remote code execution vulnerability and is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
- https://web.nvd.nist...d=CVE-2015-4852
- http://www.oracle.co...52-2763333.html
"... Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible..."
2015-Nov-12 - Rev 2. Versions Updated
> http://www.oracle.co...763334.html#FMW
> https://www.kb.cert.org/vuls/id/576313
Last revised: 15 Dec 2015
> https://commons.apac...collections.cgi
Last Published: 14 Nov 2015
- https://cxf.apache.o...advisories.html
- http://www.securityt....com/id/1034097
CVE Reference: https://web.nvd.nist...d=CVE-2015-4852
Updated: Nov 16 2015
Impact: A remote user can execute arbitrary code on the target system.
Solution: The vendor has issued a proposed fix, available at:
- http://svn.apache.or...evision=1713307
The vendor's advisory is available at:
- https://issues.apach...COLLECTIONS-580
___
>> https://cxf.apache.o...15-5253.txt.asc
"... Severity: Major
Migration:
CXF 2.7.x users should upgrade to 2.7.18 or later as soon as possible.
CXF 3.0.x users should upgrade to 3.0.7 or later as soon as possible.
CXF 3.1.x users should upgrade to 3.1.3 or later as soon as possible..."
> http://www.securityt....com/id/1034162
CVE Reference: https://web.nvd.nist...d=CVE-2015-5253
Nov 16 2015
Fix Available: Yes Vendor Confirmed: Yes
Version(s): prior to versions 2.7.18, 3.0.7, 3.1.3 ...
Solution: The vendor has issued a fix (2.7.18, 3.0.7, 3.1.3).
Edited by AplusWebMaster, 22 January 2016 - 01:52 PM.