First published: Thu Apr 14 2016(Updated: )
The HA Pooled Invoker allows unauthorised access, and deserializes any payload sent to it. This is one of the attack vectors for <a href="https://access.redhat.com/security/cve/CVE-2015-7501">CVE-2015-7501</a>. There are many new gadget chains available in the ysoserial project. For example the Beanshell library could be used to create a malicious serialized object. When deserialized by the HA Pooled Invoker servlet allows remote code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | =4.2.0 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0 | |
Red Hat JBoss Enterprise Application Platform | =5.0.0 | |
Red Hat JBoss Enterprise Application Platform | =5.1.0 | |
Red Hat JBoss Enterprise Application Platform | =5.1.1 | |
Red Hat JBoss Enterprise Application Platform | =5.1.2 | |
Red Hat JBoss Enterprise Application Platform | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3690 is considered a critical vulnerability due to unauthorized access and dangerous deserialization issues.
To fix CVE-2016-3690, you need to update your Red Hat JBoss Enterprise Application Platform to a version that is patched against this vulnerability.
CVE-2016-3690 affects Red Hat JBoss Enterprise Application Platform versions 4.2.0, 4.3.0, 5.0.0, 5.1.0, 5.1.1, 5.1.2, and 5.2.0.
If upgrading is not possible, consider implementing security measures such as network access controls and application-level security to mitigate the risk from CVE-2016-3690.
Yes, CVE-2016-3690 is one of the attack vectors for CVE-2015-7501, indicating an interconnected vulnerability scenario.