First published: Thu Apr 06 2017(Updated: )
Rogue Wave JViews before 8.8 patch 21 and 8.9 before patch 1 allows remote attackers to execute arbitrary Java code that exists in the classpath, such as test code or administration code. The issue exists because the ilog.views.faces.IlvFacesController servlet in jviews-framework-all.jar does not require explicit configuration of servlets that can be called.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perforce Jviews | <=8.8 | |
Perforce Jviews | =8.9 | |
Oracle Data Integrator | =12.2.1.3.0 | |
Oracle Data Integrator | =12.2.1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8965 has a high severity rating due to the risk of remote code execution.
To fix CVE-2015-8965, you should upgrade Rogue Wave JViews to version 8.8 patch 21 or 8.9 patch 1 or later.
CVE-2015-8965 exploits improper validation in the ilog.views.faces.IlvFacesController servlet.
CVE-2015-8965 affects Rogue Wave JViews versions prior to 8.8 patch 21 and 8.9 before patch 1, as well as Oracle Data Integrator versions 12.2.1.3.0 and 12.2.1.4.0.
Yes, CVE-2015-8965 can be exploited by remote attackers to execute arbitrary Java code.