|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
IBM WebSphere Application Server: code execution via serialized objects
Synthesis of the vulnerability
An attacker can use a vulnerability via serial of IBM WebSphere Application Server, in order to run code.
Impacted software: Security Directory Server, Tivoli Directory Server, Tivoli System Automation, Tivoli Workload Scheduler, WebSphere AS Traditional.
Severity of this computer vulnerability: 3/4.
Consequences of a hack: administrator access/rights, privileged access/rights, user access/rights.
Attacker's origin: internet client.
Creation date: 23/09/2016.
Références of this announce: 1990060, 1991866, 1991867, 1991870, 1991871, 1991875, 1991876, 1991878, 1991880, 1991882, 1991884, 1991885, 1991886, 1991887, 1991889, 1991892, 1991894, 1991896, 1991898, 1991902, 1991903, 1991951, 1991955, 1991959, 1991960, 1991961, 1995390, 1999671, 2000095, 2000544, 2002049, 2002050, 7014463, 7048591, CVE-2016-5983, VIGILANCE-VUL-20686.
Description of the vulnerability
The IBM WebSphere Application Server runs on a Java virtual machine.
It can load serialized objects from external sources. However, it likely does not restrict which classes are loaded when an object is unserialized.
An attacker can therefore send serialized objects to IBM WebSphere Application Server, in order to run code.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a system vulnerability note. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.