First published: Wed Jan 20 2016(Updated: )
It was discovered that the hotrod java client in infinispan automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks. code link: <a href="https://github.com/infinispan/infinispan/blob/master/client/hotrod-client/src/main/java/org/infinispan/client/hotrod/marshall/MarshallerUtil.java#L39">https://github.com/infinispan/infinispan/blob/master/client/hotrod-client/src/main/java/org/infinispan/client/hotrod/marshall/MarshallerUtil.java#L39</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Infinispan Infinispan | <9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0750 is considered critical due to its potential for remote code execution.
To mitigate CVE-2016-0750, upgrade Infinispan to version 9.1.0 or later.
CVE-2016-0750 affects Infinispan versions prior to 9.1.0.
Exploitation of CVE-2016-0750 can lead to remote code execution and unauthorized access.
Yes, CVE-2016-0750 involves insecure deserialization allowing attackers to execute malicious code.