CVE-2015-7450

CRITICAL KEV NUCLEI

IBM Products - Command Injection

Title source: llm

Description

Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/41613
vulncheck_xdb WRITEUP
remote
https://github.com/swisskyrepo/PayloadsAllTheThings
metasploit WORKING POC EXCELLENT
by Liatsis Fotios @liatsisfotios · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/ibm_websphere_java_deserialize.rb

Nuclei Templates (1)

IBM WebSphere Java Object Deserialization - Remote Code Execution
CRITICALby wdahlenb
Shodan: http.html:"IBM WebSphere Portal" || http.html:"ibm websphere portal"
FOFA: body="ibm websphere portal"

Scores

CVSS v3 9.8
EPSS 0.9327
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-01-10
VulnCheck KEV 2021-01-05
InTheWild.io 2022-01-10
ENISA EUVD EUVD-2015-7374
CWE
CWE-502
Status published
Products (20)
ibm/sterling_b2b_integrator 5.2
ibm/sterling_integrator 5.1
ibm/tivoli_common_reporting 2.1
ibm/tivoli_common_reporting 2.1.1
ibm/tivoli_common_reporting 2.1.1.2
ibm/tivoli_common_reporting 3.1
ibm/tivoli_common_reporting 3.1.0.1
ibm/tivoli_common_reporting 3.1.0.2
ibm/tivoli_common_reporting 3.1.2
ibm/tivoli_common_reporting 3.1.2.1
... and 10 more
Published Jan 02, 2016
KEV Added Jan 10, 2022
Tracked Since Feb 18, 2026