First published: Wed Apr 21 2021(Updated: )
Eclipse Openj9 could allow a remote attacker to bypass security restrictions, caused by a flaw in the jdk.internal.reflect.ConstantPool API. By sending a specially-crafted request, an attacker could exploit this vulnerability to call static methods or access static members without running the class initialization method.
Credit: emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Openj9 | <=0.25.0 | |
IBM Cognos Analytics | <=12.0.0-12.0.1 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP2 | |
IBM Cognos Analytics | <=11.1.1-11.1.7 FP7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28167 is a vulnerability in Eclipse Openj9 version 0.25.0 that allows the JVM to pre-resolve certain constant pool entries, enabling a user to call static methods or access static members without running the class initialization method.
CVE-2021-28167 allows users to bypass class initialization methods and call static methods or access static members directly, resulting in potential unauthorized access or privilege escalation.
CVE-2021-28167 has a severity rating of 6.5 (Medium).
To mitigate CVE-2021-28167, update Eclipse Openj9 to a version beyond 0.25.0 that contains the necessary security patches.
More information about CVE-2021-28167 can be found at the following reference: https://github.com/eclipse/openj9/issues/12016