CVE-2015-7450
CRITICAL KEV NUCLEIIBM Products - Command Injection
Title source: llmDescription
Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/41613
metasploit
WORKING POC
EXCELLENT
by Liatsis Fotios @liatsisfotios · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/ibm_websphere_java_deserialize.rb
Nuclei Templates (1)
IBM WebSphere Java Object Deserialization - Remote Code Execution
CRITICALby wdahlenb
Shodan:
http.html:"IBM WebSphere Portal" || http.html:"ibm websphere portal"
FOFA:
body="ibm websphere portal"
References (10)
Scores
CVSS v3
9.8
EPSS
0.9327
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-01-10
VulnCheck KEV
2021-01-05
InTheWild.io
2022-01-10
ENISA EUVD
EUVD-2015-7374
CWE
CWE-502
Status
published
Products (20)
ibm/sterling_b2b_integrator
5.2
ibm/sterling_integrator
5.1
ibm/tivoli_common_reporting
2.1
ibm/tivoli_common_reporting
2.1.1
ibm/tivoli_common_reporting
2.1.1.2
ibm/tivoli_common_reporting
3.1
ibm/tivoli_common_reporting
3.1.0.1
ibm/tivoli_common_reporting
3.1.0.2
ibm/tivoli_common_reporting
3.1.2
ibm/tivoli_common_reporting
3.1.2.1
... and 10 more
Published
Jan 02, 2016
KEV Added
Jan 10, 2022
Tracked Since
Feb 18, 2026