First published: Thu Jul 11 2013(Updated: )
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.geronimo.framework:geronimo-jmx-remoting | >=3.0-beta-1<3.0.1 | 3.0.1 |
Red Hat Geronimo | =3.0 | |
Red Hat Geronimo | =3.0-beta1 | |
Red Hat Geronimo | =3.0-m1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =3.0.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1777 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2013-1777, update Apache Geronimo to version 3.0.1 or later.
Apache Geronimo versions 3.0, 3.0-beta1, and 3.0-m1 are affected by CVE-2013-1777.
Yes, IBM WebSphere Application Server version 3.0.0.3 Community Edition is affected by CVE-2013-1777.
CVE-2013-1777 allows remote attackers to execute arbitrary code by exploiting improper RMI classloader implementation in JMX Remoting.