The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 01:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html - | |
| References | () http://geronimo.apache.org/30x-security-report.html - Vendor Advisory | |
| References | () http://www-01.ibm.com/support/docview.wss?uid=swg21643282 - Patch, Vendor Advisory | |
| References | () https://issues.apache.org/jira/browse/GERONIMO-6477 - | 
Information
                Published : 2013-07-11 22:55
Updated : 2025-04-11 00:51
NVD link : CVE-2013-1777
Mitre link : CVE-2013-1777
CVE.ORG link : CVE-2013-1777
JSON object : View
Products Affected
                ibm
- websphere_application_server
apache
- geronimo
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
