Show plain JSON{"id": "CVE-2016-4974", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.6}]}, "published": "2016-07-13T15:59:04.857", "references": [{"url": "http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html", "tags": ["Third Party Advisory", "VDB Entry"], "source": "secalert@redhat.com"}, {"url": "http://qpid.apache.org/components/jms/security-0-x.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://qpid.apache.org/components/jms/security.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/archive/1/538813/100/0/threaded", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/91537", "tags": ["Third Party Advisory", "VDB Entry"], "source": "secalert@redhat.com"}, {"url": "http://www.securitytracker.com/id/1036239", "tags": ["Third Party Advisory", "VDB Entry"], "source": "secalert@redhat.com"}, {"url": "https://issues.apache.org/jira/browse/QPIDJMS-188", "tags": ["Issue Tracking"], "source": "secalert@redhat.com"}, {"url": "http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://qpid.apache.org/components/jms/security-0-x.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://qpid.apache.org/components/jms/security.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/538813/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/91537", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1036239", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://issues.apache.org/jira/browse/QPIDJMS-188", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function."}, {"lang": "es", "value": "Cliente Apache Qpid AMQP 0-x JMS en versiones anteriores a 6.0.4 y JMS (AMQP 1.0) en versiones anteriores a 0.10.0 no restringe el uso de clases disponibles en la ruta de clases, lo que podr\u00eda permitir a usuarios remotos autenticados con permiso enviar mensajes para deserializar objetos arbitrarios y ejecutar c\u00f3digo arbitrario aprovechando un objeto serializado manipulado en un JMS ObjectMessage que es manejado por la funci\u00f3n getObject."}], "lastModified": "2024-11-21T02:53:20.497", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:apache:amqp_0-x_jms_client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35775B87-C368-4C5A-B3F0-2AB1DCAE6A0D", "versionEndIncluding": "6.0.3"}, {"criteria": "cpe:2.3:a:apache:jms_client_amqp:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7DFF49B-B0EC-4BD5-93D7-0D58A726645C", "versionEndIncluding": "0.9.0"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}