CVE-2016-7065

HIGH

Redhat Jboss Enterprise Application P... - Insecure Deserialization

Title source: rule
STIX 2.1

Description

The JMX servlet in Red Hat JBoss Enterprise Application Platform (EAP) 4 and 5 allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted serialized Java object.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Mediaservice.net Srl. · textwebappsjava
https://www.exploit-db.com/exploits/40842

References (4)

Core 4
Core References
Issue Tracking, Vendor Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1382534
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/40842/
Mailing List mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2016/Nov/143
Third Party Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/93462

Scores

CVSS v3 8.8
EPSS 0.1210
EPSS Percentile 93.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-502
Status published
Products (2)
redhat/jboss_enterprise_application_platform 4.0.0
redhat/jboss_enterprise_application_platform 5.0.0
Published Oct 13, 2016
Tracked Since Feb 18, 2026