The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as control elements or syntactic markers when they are sent to a downstream component.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://issues.jboss.org/browse/ISPN-7781 | issue tracking third party advisory |
http://www.securityfocus.com/bid/101910 | vdb entry third party advisory |
https://github.com/infinispan/infinispan/pull/5116 | patch vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0501 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:3244 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0750 | issue tracking vendor advisory |