First published: Thu Jul 11 2013(Updated: )
The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenJPA | =1.0.0 | |
Apache OpenJPA | =1.0.1 | |
Apache OpenJPA | =1.0.2 | |
Apache OpenJPA | =1.0.3 | |
Apache OpenJPA | =1.0.4 | |
Apache OpenJPA | =1.1.0 | |
Apache OpenJPA | =1.2.0 | |
Apache OpenJPA | =1.2.1 | |
Apache OpenJPA | =1.2.2 | |
Apache OpenJPA | =2.0.0 | |
Apache OpenJPA | =2.0.1 | |
Apache OpenJPA | =2.1.0 | |
Apache OpenJPA | =2.1.1 | |
Apache OpenJPA | =2.2.0 | |
Apache OpenJPA | =2.2.1 | |
maven/org.apache.openjpa:openjpa | >=2.0.0<2.2.2 | 2.2.2 |
maven/org.apache.openjpa:openjpa | >=1.0.0<1.2.3 | 1.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.