First published: Mon Jul 07 2014(Updated: )
It was found that commons-beanutils exposes the class property by default, with no mechanism to disable access to it. If a framework built on commons-beanutils does not otherwise suppress access to the class property, then a remote attacker could use this flaw to manipulate the ClassLoader used by the underlying container. This could lead to remote code execution under certain conditions.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache commons-beanutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1116665 is considered critical due to the potential for remote code execution.
To fix REDHAT-BUG-1116665, upgrade to a patched version of Apache commons-beanutils that restricts access to the class property.
All versions of Apache commons-beanutils prior to the patched release are affected by REDHAT-BUG-1116665.
Yes, REDHAT-BUG-1116665 can be exploited by a remote attacker if the framework built on commons-beanutils does not suppress access to the class property.
A possible workaround for REDHAT-BUG-1116665 is to configure the application to limit access to the class properties directly.