ID CVE-2018-17191
Summary Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:netbeans:9.0:-:*:*:*:*:*:*
    cpe:2.3:a:apache:netbeans:9.0:-:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 23-05-2023 - 13:31)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 106352
misc https://lists.apache.org/thread.html/d1c37966a316a326ab4ff4d4bc056322e8adcbe984e8145c0ecda7fa@%3Cdev.netbeans.apache.org%3E
Last major update 23-05-2023 - 13:31
Published 31-12-2018 - 14:29
Last modified 23-05-2023 - 13:31
Back to Top