First published: Tue May 16 2017(Updated: )
HTTPServerILServlet.java in JMS over HTTP Invocation Layer of the JbossMQ implementation (jbossmq-httpil.sar, which is enabled by default in Red Hat Jboss Applicatino Server <= Jboss 4.X) does not restrict the classes for which it performs deserialization, which allows remote attackers to execute arbitrary code via crafted serialized data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | <=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7504 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2017-7504, it is recommended to upgrade to a version of JBoss that is not vulnerable, specifically JBoss Enterprise Application Platform version 4.1 or higher.
CVE-2017-7504 affects Red Hat JBoss Enterprise Application Platform versions up to and including 4.0.
CVE-2017-7504 allows remote attackers to execute arbitrary code due to unrestricted deserialization of classes.
Yes, the vulnerable JMS over HTTP Invocation Layer in JBossMQ is enabled by default in JBoss Application Server versions 4.x.