The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21643282 | patch vendor advisory |
https://issues.apache.org/jira/browse/GERONIMO-6477 | |
http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html | mailing list |
http://geronimo.apache.org/30x-security-report.html | vendor advisory |