First published: Mon Feb 22 2016(Updated: )
BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bsh2 | <2.0 | 2.0 |
Git Git-shell | =1.0 | |
Git Git-shell | =2.0-beta1 | |
Git Git-shell | =2.0-beta4 | |
Git Git-shell | =2.0-beta5 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2510 is rated as a high severity vulnerability due to its ability to allow remote code execution.
CVE-2016-2510 allows remote attackers to execute arbitrary code by using crafted serialized data with vulnerable applications that include BeanShell.
Versions before BeanShell 2.0b6, including 1.0 and all beta versions up to 2.0b5, are affected by CVE-2016-2510.
To remediate CVE-2016-2510, upgrade to BeanShell version 2.0 or newer, which addresses the vulnerability.
If exploited, CVE-2016-2510 can compromise system integrity, leading to unauthorized control and data loss.