Rogue Wave JViews before 8.8 patch 21 and 8.9 before patch 1 allows remote attackers to execute arbitrary Java code that exists in the classpath, such as test code or administration code. The issue exists because the ilog.views.faces.IlvFacesController servlet in jviews-framework-all.jar does not require explicit configuration of servlets that can be called.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | patch |
https://www.oracle.com/security-alerts/cpujan2021.html | third party advisory |
https://rwkbp.makekb.com/?View=entry&EntryID=2521 | vendor advisory |