CVE-2017-12149
CRITICAL KEV RANSOMWARE NUCLEIJboss Application Server - Code Injection
Title source: llmDescription
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
Exploits (12)
github
WORKING POC
1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2017-12149
github
WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2017-12149
Nuclei Templates (1)
Jboss Application Server - Remote Code Execution
CRITICALby fopina,s0obi
Shodan:
http.title:"jboss" || cpe:"cpe:2.3:a:redhat:jboss_enterprise_application_platform"
FOFA:
title="jboss"
References (6)
Scores
CVSS v3
9.8
EPSS
0.9429
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2021-12-10
VulnCheck KEV
2017-12-02
InTheWild.io
2021-04-08
ENISA EUVD
EUVD-2017-3733
Ransomware Use
Confirmed
Classification
CWE
CWE-502
Status
draft
Affected Products (9)
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
Timeline
Published
Oct 04, 2017
KEV Added
Dec 10, 2021
Tracked Since
Feb 18, 2026