First published: Thu Jan 09 2014(Updated: )
A code execution vulnerability has been discovered in Drools. The flaw allows remote authenticated attackers to submit arbitrary Java code in MVEL or Drools expressions, the code would be executed within the security context of the application server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss BPM Suite | =6.0.0 | |
Red Hat JBoss Drools | ||
Red Hat JBoss Enterprise BRMS Platform | =6.0.0 | |
=6.0.0 | ||
=6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6468 is categorized as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2013-6468, update to Red Hat JBoss Drools version 6.0.1 or later.
CVE-2013-6468 affects Red Hat JBoss BRMS version 6.0.0, Red Hat JBoss BPM Suite version 6.0.0, and other versions of JBoss Drools.
CVE-2013-6468 can be exploited by remote authenticated attackers to execute arbitrary Java code.
The implications of CVE-2013-6468 include unauthorized access and control over the affected application server.