In the server in SerNet verinice before 1.22.2, insecure Java deserialization allows remote authenticated attackers to execute arbitrary code.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://verinice.com/en/support/security-advisory | patch vendor advisory |
https://github.com/SerNet/verinice/compare/1.22.1...1.22.2 | patch |
https://github.com/0xBrAinsTorM/CVE-2021-36981 | issue tracking exploit |
https://www.secianus.de/worum-geht-es/aktuelle-meldung/cve-2021-36981-verinicepro-unsafe-java-deserialization | third party advisory exploit |