Flashes (Alerts)
Abstract
A problem in the RMI classloader may enable an attacker to send a serializated object via JMX that could compromise the system.
Content
Vulnerability Details
A specially crafted serialized object sent via the JMX connector could compromise the system due to a misconfigured RMI classloader.
CVEID : CVE-2013-1777
CVSS Base Score : 10
CVSS Temporal Score : See https://exchange.xforce.ibmcloud.com/vulnerabilities/82268 for the current score
CVSS Environmental Score *: Undefined
CVSS Vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Affected Products And Versions
WebSphere Application Server Community Edition 3.0.0.3
Remediation
Upgrade WebSphere Application Server Community Edition server to version 3.0.0.4.
Or follow the instruction bellow to fix this issue in WebSphere Application Server Community Edition 3.0.0.3.
2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation.
3. Start the server with the cache cleaned, for example,
<WAS_CE_HOME>\bin\startup -c
<WAS_CE_HOME>/bin/startup.sh -c
Mitigation
To prevent remote exploits hide the naming(1099) and JMX(9999) ports behind a firewall or bind them to a local network interface.
References:
Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY
Was this topic helpful?
Document Information
Modified date:
25 September 2022
UID
swg21643282