The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101910 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:3244 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:0501 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0750 | Issue Tracking Vendor Advisory |
https://github.com/infinispan/infinispan/pull/5116 | Patch Vendor Advisory |
https://issues.jboss.org/browse/ISPN-7781 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-09-11 13:29
Updated : 2023-11-07 02:29
NVD link : CVE-2016-0750
Mitre link : CVE-2016-0750
CVE.ORG link : CVE-2016-0750
JSON object : View
Products Affected
infinispan
- infinispan