First published: Thu Apr 14 2016(Updated: )
The HA Pooled Invoker allows unauthorised access, and deserializes any payload sent to it. This is one of the attack vectors for <a href="https://access.redhat.com/security/cve/CVE-2015-7501">CVE-2015-7501</a>. There are many new gadget chains available in the ysoserial project. For example the Beanshell library could be used to create a malicious serialized object. When deserialized by the HA Pooled Invoker servlet allows remote code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Enterprise Application Platform | =4.2.0 | |
Redhat Jboss Enterprise Application Platform | =4.3.0 | |
Redhat Jboss Enterprise Application Platform | =5.0.0 | |
Redhat Jboss Enterprise Application Platform | =5.1.0 | |
Redhat Jboss Enterprise Application Platform | =5.1.1 | |
Redhat Jboss Enterprise Application Platform | =5.1.2 | |
Redhat Jboss Enterprise Application Platform | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.