ID CVE-2016-7050
Summary SerializableProvider in RESTEasy in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to execute arbitrary code.
References
Vulnerable Configurations
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
  • RedHat Enterprise Linux HPC Node 7.0
    cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
CVSS
Base: 7.5
Impact:
Exploitability:
CWE CWE-502
CAPEC
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2016-2604.NASL
    description An update for resteasy-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. RESTEasy contains a JBoss project that provides frameworks to help build RESTful Web Services and RESTful Java applications. It is a fully certified and portable implementation of the JAX-RS specification. Security Fix(es) : * It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy. (CVE-2016-7050) Red Hat would like to thank Mikhail Egorov (Odin) for reporting this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 95350
    published 2016-11-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=95350
    title CentOS 7 : resteasy-base (CESA-2016:2604)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2016-1057.NASL
    description According to the version of the resteasy-base packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw execute arbitrary code with the permissions of the application using RESTEasy.(CVE-2016-7050) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-14
    plugin id 99819
    published 2017-05-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99819
    title EulerOS 2.0 SP1 : resteasy-base (EulerOS-SA-2016-1057)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20161103_RESTEASY_BASE_ON_SL7_X.NASL
    description Security Fix(es) : - It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy. (CVE-2016-7050) Additional Changes :
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 95859
    published 2016-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=95859
    title Scientific Linux Security Update : resteasy-base on SL7.x (noarch)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-2604.NASL
    description An update for resteasy-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. RESTEasy contains a JBoss project that provides frameworks to help build RESTful Web Services and RESTful Java applications. It is a fully certified and portable implementation of the JAX-RS specification. Security Fix(es) : * It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy. (CVE-2016-7050) Red Hat would like to thank Mikhail Egorov (Odin) for reporting this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 94567
    published 2016-11-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94567
    title RHEL 7 : resteasy-base (RHSA-2016:2604)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2016-2604.NASL
    description From Red Hat Security Advisory 2016:2604 : An update for resteasy-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. RESTEasy contains a JBoss project that provides frameworks to help build RESTful Web Services and RESTful Java applications. It is a fully certified and portable implementation of the JAX-RS specification. Security Fix(es) : * It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy. (CVE-2016-7050) Red Hat would like to thank Mikhail Egorov (Odin) for reporting this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 94723
    published 2016-11-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94723
    title Oracle Linux 7 : resteasy-base (ELSA-2016-2604)
redhat via4
advisories
bugzilla
id 1378613
title CVE-2016-7050 RESTEasy:SerializableProvider enabled by default and deserializes untrusted data
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhsa:tst:20140675001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhsa:tst:20140675002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhsa:tst:20140675003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhsa:tst:20140675004
  • OR
    • AND
      • comment resteasy-base is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604015
      • comment resteasy-base is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011006
    • AND
      • comment resteasy-base-atom-provider is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604005
      • comment resteasy-base-atom-provider is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011010
    • AND
      • comment resteasy-base-client is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604013
      • comment resteasy-base-client is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20162604014
    • AND
      • comment resteasy-base-jackson-provider is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604021
      • comment resteasy-base-jackson-provider is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011018
    • AND
      • comment resteasy-base-javadoc is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604019
      • comment resteasy-base-javadoc is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011022
    • AND
      • comment resteasy-base-jaxb-provider is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604007
      • comment resteasy-base-jaxb-provider is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011026
    • AND
      • comment resteasy-base-jaxrs is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604023
      • comment resteasy-base-jaxrs is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011024
    • AND
      • comment resteasy-base-jaxrs-all is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604009
      • comment resteasy-base-jaxrs-all is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011012
    • AND
      • comment resteasy-base-jaxrs-api is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604025
      • comment resteasy-base-jaxrs-api is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011020
    • AND
      • comment resteasy-base-jettison-provider is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604011
      • comment resteasy-base-jettison-provider is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011014
    • AND
      • comment resteasy-base-providers-pom is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604029
      • comment resteasy-base-providers-pom is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011016
    • AND
      • comment resteasy-base-resteasy-pom is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604017
      • comment resteasy-base-resteasy-pom is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20162604018
    • AND
      • comment resteasy-base-tjws is earlier than 0:3.0.6-4.el7
        oval oval:com.redhat.rhsa:tst:20162604027
      • comment resteasy-base-tjws is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20141011008
rhsa
id RHSA-2016:2604
released 2016-11-03
severity Important
title RHSA-2016:2604: resteasy-base security and bug fix update (Important)
rpms
  • resteasy-base-0:3.0.6-4.el7
  • resteasy-base-atom-provider-0:3.0.6-4.el7
  • resteasy-base-client-0:3.0.6-4.el7
  • resteasy-base-jackson-provider-0:3.0.6-4.el7
  • resteasy-base-javadoc-0:3.0.6-4.el7
  • resteasy-base-jaxb-provider-0:3.0.6-4.el7
  • resteasy-base-jaxrs-0:3.0.6-4.el7
  • resteasy-base-jaxrs-all-0:3.0.6-4.el7
  • resteasy-base-jaxrs-api-0:3.0.6-4.el7
  • resteasy-base-jettison-provider-0:3.0.6-4.el7
  • resteasy-base-providers-pom-0:3.0.6-4.el7
  • resteasy-base-resteasy-pom-0:3.0.6-4.el7
  • resteasy-base-tjws-0:3.0.6-4.el7
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=1378613
Last major update 08-06-2017 - 15:29
Published 08-06-2017 - 15:29
Last modified 16-06-2017 - 08:03
Back to Top