First published: Wed Jul 31 2019(Updated: )
It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from <jar/> elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Icedtea-web Project Icedtea-web | <=1.7.2 | |
Icedtea-web Project Icedtea-web | =1.8.2 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-10182.
The severity of CVE-2019-10182 is high.
The affected software versions for CVE-2019-10182 are icedtea-web 1.7.2 and 1.8.2.
CVE-2019-10182 allows an attacker to trick a victim into running a specially crafted application and upload arbitrary files to arbitrary locations in the user's context.
Yes, here are some references for CVE-2019-10182: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html, http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html, https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10182