CVE-2016-7065
HIGHRedhat Jboss Enterprise Application P... - Insecure Deserialization
Title source: ruleDescription
The JMX servlet in Red Hat JBoss Enterprise Application Platform (EAP) 4 and 5 allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted serialized Java object.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Mediaservice.net Srl. · textwebappsjava
https://www.exploit-db.com/exploits/40842
References (4)
Core 4
Core References
Issue Tracking, Vendor Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1382534
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/40842/
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2016/Nov/143
Third Party Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/93462
Scores
CVSS v3
8.8
EPSS
0.1210
EPSS Percentile
93.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-502
Status
published
Products (2)
redhat/jboss_enterprise_application_platform
4.0.0
redhat/jboss_enterprise_application_platform
5.0.0
Published
Oct 13, 2016
Tracked Since
Feb 18, 2026