Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-2510 (GCVE-0-2016-2510)
Vulnerability from cvelistv5 – Published: 2016-04-07 20:00 – Updated: 2024-08-05 23:32- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T23:32:20.399Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2016:2035",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"name": "84139",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/84139"
},
{
"name": "RHSA-2016:1135",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"name": "RHSA-2016:0540",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"name": "RHSA-2016:1376",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"name": "openSUSE-SU-2016:0788",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"name": "RHSA-2016:0539",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"name": "DSA-3504",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"name": "1035440",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1035440"
},
{
"name": "openSUSE-SU-2016:0833",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"name": "USN-2923-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2923-1"
},
{
"name": "GLSA-201607-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"name": "RHSA-2019:1545",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-02-18T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-20T21:14:50.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2016:2035",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"name": "84139",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/84139"
},
{
"name": "RHSA-2016:1135",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"name": "RHSA-2016:0540",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"name": "RHSA-2016:1376",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"name": "openSUSE-SU-2016:0788",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"name": "RHSA-2016:0539",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"name": "DSA-3504",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"name": "1035440",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1035440"
},
{
"name": "openSUSE-SU-2016:0833",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"name": "USN-2923-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2923-1"
},
{
"name": "GLSA-201607-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"name": "RHSA-2019:1545",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-2510",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:2035",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"name": "84139",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84139"
},
{
"name": "RHSA-2016:1135",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"name": "RHSA-2016:0540",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"name": "RHSA-2016:1376",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"name": "openSUSE-SU-2016:0788",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"name": "RHSA-2016:0539",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"name": "DSA-3504",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"name": "1035440",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035440"
},
{
"name": "openSUSE-SU-2016:0833",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"name": "USN-2923-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2923-1"
},
{
"name": "GLSA-201607-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"name": "RHSA-2019:1545",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"name": "https://github.com/frohoff/ysoserial/pull/13",
"refsource": "MISC",
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"name": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49",
"refsource": "CONFIRM",
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"name": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced",
"refsource": "CONFIRM",
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"name": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"refsource": "CONFIRM",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"name": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf",
"refsource": "MISC",
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-2510",
"datePublished": "2016-04-07T20:00:00.000Z",
"dateReserved": "2016-02-18T00:00:00.000Z",
"dateUpdated": "2024-08-05T23:32:20.399Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2016-2510",
"date": "2026-05-19",
"epss": "0.39216",
"percentile": "0.97339"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:beanshell:beanshell:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"777A0470-3B20-4CA0-AB9C-031977650E13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:beanshell:beanshell:2.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E6D6046-6144-4AD4-BA57-115675C842A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:beanshell:beanshell:2.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C268530A-6055-4B8B-A66B-0D84BB1B413F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:beanshell:beanshell:2.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"79DCB82A-8121-4363-B8C3-8F0DE907A558\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.\"}, {\"lang\": \"es\", \"value\": \"BeanShell (bsh) en versiones anteriores a 2.0b6, cuando est\\u00e1 incluido en el classpath por una aplicaci\\u00f3n que usa serializaci\\u00f3n Java o XStream, permite a atacantes remotos ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de datos serializados manipulados, relacionado con XThis.Handler.\"}]",
"id": "CVE-2016-2510",
"lastModified": "2024-11-21T02:48:35.350",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2016-04-07T20:59:05.567",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0539.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0540.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2035.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2016/dsa-3504\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/84139\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1035440\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2923-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1135\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1376\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1545\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/beanshell/beanshell/releases/tag/2.0b6\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/frohoff/ysoserial/pull/13\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201607-17\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0539.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0540.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2035.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2016/dsa-3504\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/84139\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1035440\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2923-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1135\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1376\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1545\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/beanshell/beanshell/releases/tag/2.0b6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/frohoff/ysoserial/pull/13\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201607-17\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-19\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-2510\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-04-07T20:59:05.567\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.\"},{\"lang\":\"es\",\"value\":\"BeanShell (bsh) en versiones anteriores a 2.0b6, cuando est\u00e1 incluido en el classpath por una aplicaci\u00f3n que usa serializaci\u00f3n Java o XStream, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de datos serializados manipulados, relacionado con XThis.Handler.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beanshell:beanshell:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"777A0470-3B20-4CA0-AB9C-031977650E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beanshell:beanshell:2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6D6046-6144-4AD4-BA57-115675C842A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beanshell:beanshell:2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C268530A-6055-4B8B-A66B-0D84BB1B413F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beanshell:beanshell:2.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"79DCB82A-8121-4363-B8C3-8F0DE907A558\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0539.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0540.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2035.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3504\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/84139\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1035440\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2923-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1135\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1376\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1545\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/beanshell/beanshell/releases/tag/2.0b6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/frohoff/ysoserial/pull/13\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201607-17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0539.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0540.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3504\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/84139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1035440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2923-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1376\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1545\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/beanshell/beanshell/releases/tag/2.0b6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/frohoff/ysoserial/pull/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201607-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
CNVD-2016-01482
Vulnerability from cnvd - Published: 2016-03-08用户可参考如下供应商提供的安全公告获得补丁信息:
http://www.debian.org/security/2016/dsa-3504
| Name | BeanShell BeanShell |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-2510"
}
},
"description": "BeanShell\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u3001\u514d\u8d39\u7684Java\u6e90\u4ee3\u7801\u89e3\u91ca\u5668\u3002\r\n\r\nBeanShell\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002",
"discovererName": "unknown",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a \r\nhttp://www.debian.org/security/2016/dsa-3504",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-01482",
"openTime": "2016-03-08",
"patchDescription": "BeanShell\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u3001\u514d\u8d39\u7684Java\u6e90\u4ee3\u7801\u89e3\u91ca\u5668\u3002\r\n\r\nBeanShell\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "BeanShell\u4efb\u610f\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "BeanShell BeanShell"
},
"referenceLink": "http://www.debian.org/security/2016/dsa-3504",
"serverity": "\u9ad8",
"submitTime": "2016-03-07",
"title": "BeanShell\u4efb\u610f\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e"
}
FKIE_CVE-2016-2510
Vulnerability from fkie_nvd - Published: 2016-04-07 20:59 - Updated: 2026-05-06 22:30| Vendor | Product | Version | |
|---|---|---|---|
| beanshell | beanshell | 1.0 | |
| beanshell | beanshell | 2.0 | |
| beanshell | beanshell | 2.0 | |
| beanshell | beanshell | 2.0 | |
| debian | debian_linux | 7.0 | |
| debian | debian_linux | 8.0 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 15.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:beanshell:beanshell:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "777A0470-3B20-4CA0-AB9C-031977650E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:beanshell:beanshell:2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "8E6D6046-6144-4AD4-BA57-115675C842A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:beanshell:beanshell:2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "C268530A-6055-4B8B-A66B-0D84BB1B413F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:beanshell:beanshell:2.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "79DCB82A-8121-4363-B8C3-8F0DE907A558",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler."
},
{
"lang": "es",
"value": "BeanShell (bsh) en versiones anteriores a 2.0b6, cuando est\u00e1 incluido en el classpath por una aplicaci\u00f3n que usa serializaci\u00f3n Java o XStream, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de datos serializados manipulados, relacionado con XThis.Handler."
}
],
"id": "CVE-2016-2510",
"lastModified": "2026-05-06T22:30:45.220",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-04-07T20:59:05.567",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/84139"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035440"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2923-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"source": "cve@mitre.org",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/84139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2923-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-19"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-GXG6-RC6C-V673
Vulnerability from github – Published: 2022-05-13 01:14 – Updated: 2022-07-06 19:57BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2.0b5"
},
"package": {
"ecosystem": "Maven",
"name": "org.apache-extras.beanshell:bsh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0b6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2016-2510"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2022-07-06T19:57:52Z",
"nvd_published_at": "2016-04-07T20:59:00Z",
"severity": "HIGH"
},
"details": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.",
"id": "GHSA-gxg6-rc6c-v673",
"modified": "2022-07-06T19:57:52Z",
"published": "2022-05-13T01:14:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510"
},
{
"type": "WEB",
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"type": "WEB",
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"type": "WEB",
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"type": "WEB",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"type": "WEB",
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2923-1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Improper Input Validation in BeanShell"
}
GSD-2016-2510
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-2510",
"description": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.",
"id": "GSD-2016-2510",
"references": [
"https://www.suse.com/security/cve/CVE-2016-2510.html",
"https://www.debian.org/security/2016/dsa-3504",
"https://access.redhat.com/errata/RHSA-2019:1545",
"https://access.redhat.com/errata/RHSA-2016:2035",
"https://access.redhat.com/errata/RHSA-2016:1376",
"https://access.redhat.com/errata/RHSA-2016:1135",
"https://access.redhat.com/errata/RHSA-2016:0540",
"https://access.redhat.com/errata/RHSA-2016:0539",
"https://ubuntu.com/security/CVE-2016-2510"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-2510"
],
"details": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.",
"id": "GSD-2016-2510",
"modified": "2023-12-13T01:21:19.928017Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-2510",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:2035",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"name": "84139",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84139"
},
{
"name": "RHSA-2016:1135",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"name": "RHSA-2016:0540",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"name": "RHSA-2016:1376",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"name": "openSUSE-SU-2016:0788",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"name": "RHSA-2016:0539",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"name": "DSA-3504",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"name": "1035440",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035440"
},
{
"name": "openSUSE-SU-2016:0833",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"name": "USN-2923-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2923-1"
},
{
"name": "GLSA-201607-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"name": "RHSA-2019:1545",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"name": "https://github.com/frohoff/ysoserial/pull/13",
"refsource": "MISC",
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"name": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49",
"refsource": "CONFIRM",
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"name": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced",
"refsource": "CONFIRM",
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"name": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"refsource": "CONFIRM",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"name": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf",
"refsource": "MISC",
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "[2.0b5,2.0b6)",
"affected_versions": "All versions starting from 2 up to 2.0b5",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-19",
"CWE-937"
],
"date": "2019-09-19",
"description": "BeanShell when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to `XThis.Handler`.",
"fixed_versions": [
"2.0b6"
],
"identifier": "CVE-2016-2510",
"identifiers": [
"CVE-2016-2510"
],
"not_impacted": "All versions before 2, all versions after 2.0b5",
"package_slug": "maven/org.apache-extras.beanshell/bsh",
"pubdate": "2016-04-07",
"solution": "Upgrade to version 2.0b6 or above.",
"title": "Code Injection",
"urls": [
"https://access.redhat.com/security/cve/cve-2016-2510",
"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2510",
"https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
],
"uuid": "07b21e45-44b5-421f-952a-3cfeaf3a575b"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:beanshell:beanshell:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:beanshell:beanshell:2.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:beanshell:beanshell:2.0:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:beanshell:beanshell:2.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-2510"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-19"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf"
},
{
"name": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced"
},
{
"name": "https://github.com/frohoff/ysoserial/pull/13",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/frohoff/ysoserial/pull/13"
},
{
"name": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
},
{
"name": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49"
},
{
"name": "DSA-3504",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2016/dsa-3504"
},
{
"name": "RHSA-2016:0540",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0540.html"
},
{
"name": "RHSA-2016:0539",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0539.html"
},
{
"name": "RHSA-2016:1135",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"name": "84139",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/84139"
},
{
"name": "GLSA-201607-17",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201607-17"
},
{
"name": "1035440",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035440"
},
{
"name": "USN-2923-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2923-1"
},
{
"name": "openSUSE-SU-2016:0788",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html"
},
{
"name": "openSUSE-SU-2016:0833",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html"
},
{
"name": "RHSA-2016:1376",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"name": "RHSA-2016:2035",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"name": "RHSA-2019:1545",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"tags": [],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-10-20T22:15Z",
"publishedDate": "2016-04-07T20:59Z"
}
}
}
OPENSUSE-SU-2024:10420-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "bsh2-2.0.0.b6-2.7 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the bsh2-2.0.0.b6-2.7 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10420",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10420-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2510 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2510/"
}
],
"title": "bsh2-2.0.0.b6-2.7 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10420-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bsh2-2.0.0.b6-2.7.aarch64",
"product": {
"name": "bsh2-2.0.0.b6-2.7.aarch64",
"product_id": "bsh2-2.0.0.b6-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "bsh2-bsf-2.0.0.b6-2.7.aarch64",
"product": {
"name": "bsh2-bsf-2.0.0.b6-2.7.aarch64",
"product_id": "bsh2-bsf-2.0.0.b6-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "bsh2-classgen-2.0.0.b6-2.7.aarch64",
"product": {
"name": "bsh2-classgen-2.0.0.b6-2.7.aarch64",
"product_id": "bsh2-classgen-2.0.0.b6-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "bsh2-demo-2.0.0.b6-2.7.aarch64",
"product": {
"name": "bsh2-demo-2.0.0.b6-2.7.aarch64",
"product_id": "bsh2-demo-2.0.0.b6-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "bsh2-javadoc-2.0.0.b6-2.7.aarch64",
"product": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.aarch64",
"product_id": "bsh2-javadoc-2.0.0.b6-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "bsh2-manual-2.0.0.b6-2.7.aarch64",
"product": {
"name": "bsh2-manual-2.0.0.b6-2.7.aarch64",
"product_id": "bsh2-manual-2.0.0.b6-2.7.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bsh2-2.0.0.b6-2.7.ppc64le",
"product": {
"name": "bsh2-2.0.0.b6-2.7.ppc64le",
"product_id": "bsh2-2.0.0.b6-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "bsh2-bsf-2.0.0.b6-2.7.ppc64le",
"product": {
"name": "bsh2-bsf-2.0.0.b6-2.7.ppc64le",
"product_id": "bsh2-bsf-2.0.0.b6-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "bsh2-classgen-2.0.0.b6-2.7.ppc64le",
"product": {
"name": "bsh2-classgen-2.0.0.b6-2.7.ppc64le",
"product_id": "bsh2-classgen-2.0.0.b6-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "bsh2-demo-2.0.0.b6-2.7.ppc64le",
"product": {
"name": "bsh2-demo-2.0.0.b6-2.7.ppc64le",
"product_id": "bsh2-demo-2.0.0.b6-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "bsh2-javadoc-2.0.0.b6-2.7.ppc64le",
"product": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.ppc64le",
"product_id": "bsh2-javadoc-2.0.0.b6-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "bsh2-manual-2.0.0.b6-2.7.ppc64le",
"product": {
"name": "bsh2-manual-2.0.0.b6-2.7.ppc64le",
"product_id": "bsh2-manual-2.0.0.b6-2.7.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bsh2-2.0.0.b6-2.7.s390x",
"product": {
"name": "bsh2-2.0.0.b6-2.7.s390x",
"product_id": "bsh2-2.0.0.b6-2.7.s390x"
}
},
{
"category": "product_version",
"name": "bsh2-bsf-2.0.0.b6-2.7.s390x",
"product": {
"name": "bsh2-bsf-2.0.0.b6-2.7.s390x",
"product_id": "bsh2-bsf-2.0.0.b6-2.7.s390x"
}
},
{
"category": "product_version",
"name": "bsh2-classgen-2.0.0.b6-2.7.s390x",
"product": {
"name": "bsh2-classgen-2.0.0.b6-2.7.s390x",
"product_id": "bsh2-classgen-2.0.0.b6-2.7.s390x"
}
},
{
"category": "product_version",
"name": "bsh2-demo-2.0.0.b6-2.7.s390x",
"product": {
"name": "bsh2-demo-2.0.0.b6-2.7.s390x",
"product_id": "bsh2-demo-2.0.0.b6-2.7.s390x"
}
},
{
"category": "product_version",
"name": "bsh2-javadoc-2.0.0.b6-2.7.s390x",
"product": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.s390x",
"product_id": "bsh2-javadoc-2.0.0.b6-2.7.s390x"
}
},
{
"category": "product_version",
"name": "bsh2-manual-2.0.0.b6-2.7.s390x",
"product": {
"name": "bsh2-manual-2.0.0.b6-2.7.s390x",
"product_id": "bsh2-manual-2.0.0.b6-2.7.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bsh2-2.0.0.b6-2.7.x86_64",
"product": {
"name": "bsh2-2.0.0.b6-2.7.x86_64",
"product_id": "bsh2-2.0.0.b6-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "bsh2-bsf-2.0.0.b6-2.7.x86_64",
"product": {
"name": "bsh2-bsf-2.0.0.b6-2.7.x86_64",
"product_id": "bsh2-bsf-2.0.0.b6-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "bsh2-classgen-2.0.0.b6-2.7.x86_64",
"product": {
"name": "bsh2-classgen-2.0.0.b6-2.7.x86_64",
"product_id": "bsh2-classgen-2.0.0.b6-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "bsh2-demo-2.0.0.b6-2.7.x86_64",
"product": {
"name": "bsh2-demo-2.0.0.b6-2.7.x86_64",
"product_id": "bsh2-demo-2.0.0.b6-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "bsh2-javadoc-2.0.0.b6-2.7.x86_64",
"product": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.x86_64",
"product_id": "bsh2-javadoc-2.0.0.b6-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "bsh2-manual-2.0.0.b6-2.7.x86_64",
"product": {
"name": "bsh2-manual-2.0.0.b6-2.7.x86_64",
"product_id": "bsh2-manual-2.0.0.b6-2.7.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-2.0.0.b6-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.aarch64"
},
"product_reference": "bsh2-2.0.0.b6-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-2.0.0.b6-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.ppc64le"
},
"product_reference": "bsh2-2.0.0.b6-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-2.0.0.b6-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.s390x"
},
"product_reference": "bsh2-2.0.0.b6-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-2.0.0.b6-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.x86_64"
},
"product_reference": "bsh2-2.0.0.b6-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-bsf-2.0.0.b6-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.aarch64"
},
"product_reference": "bsh2-bsf-2.0.0.b6-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-bsf-2.0.0.b6-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.ppc64le"
},
"product_reference": "bsh2-bsf-2.0.0.b6-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-bsf-2.0.0.b6-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.s390x"
},
"product_reference": "bsh2-bsf-2.0.0.b6-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-bsf-2.0.0.b6-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.x86_64"
},
"product_reference": "bsh2-bsf-2.0.0.b6-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-classgen-2.0.0.b6-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.aarch64"
},
"product_reference": "bsh2-classgen-2.0.0.b6-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-classgen-2.0.0.b6-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.ppc64le"
},
"product_reference": "bsh2-classgen-2.0.0.b6-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-classgen-2.0.0.b6-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.s390x"
},
"product_reference": "bsh2-classgen-2.0.0.b6-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-classgen-2.0.0.b6-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.x86_64"
},
"product_reference": "bsh2-classgen-2.0.0.b6-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-demo-2.0.0.b6-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.aarch64"
},
"product_reference": "bsh2-demo-2.0.0.b6-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-demo-2.0.0.b6-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.ppc64le"
},
"product_reference": "bsh2-demo-2.0.0.b6-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-demo-2.0.0.b6-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.s390x"
},
"product_reference": "bsh2-demo-2.0.0.b6-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-demo-2.0.0.b6-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.x86_64"
},
"product_reference": "bsh2-demo-2.0.0.b6-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.aarch64"
},
"product_reference": "bsh2-javadoc-2.0.0.b6-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.ppc64le"
},
"product_reference": "bsh2-javadoc-2.0.0.b6-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.s390x"
},
"product_reference": "bsh2-javadoc-2.0.0.b6-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-javadoc-2.0.0.b6-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.x86_64"
},
"product_reference": "bsh2-javadoc-2.0.0.b6-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-manual-2.0.0.b6-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.aarch64"
},
"product_reference": "bsh2-manual-2.0.0.b6-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-manual-2.0.0.b6-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.ppc64le"
},
"product_reference": "bsh2-manual-2.0.0.b6-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-manual-2.0.0.b6-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.s390x"
},
"product_reference": "bsh2-manual-2.0.0.b6-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bsh2-manual-2.0.0.b6-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.x86_64"
},
"product_reference": "bsh2-manual-2.0.0.b6-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-2510",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2510"
}
],
"notes": [
{
"category": "general",
"text": "BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2510",
"url": "https://www.suse.com/security/cve/CVE-2016-2510"
},
{
"category": "external",
"summary": "SUSE Bug 967593 for CVE-2016-2510",
"url": "https://bugzilla.suse.com/967593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-bsf-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-classgen-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-demo-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-javadoc-2.0.0.b6-2.7.x86_64",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.aarch64",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.ppc64le",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.s390x",
"openSUSE Tumbleweed:bsh2-manual-2.0.0.b6-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2016-2510"
}
]
}
RHSA-2016:0539
Vulnerability from csaf_redhat - Published: 2016-03-30 18:16 - Updated: 2026-05-14 22:23A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss BPMS 6.2
Red Hat / Red Hat Process Automation Manager
|
cpe:/a:redhat:jboss_bpms:6.2
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss BPM Suite.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.2.2 serves as a replacement for\nRed Hat JBoss BPM Suite 6.2.1, and includes bug fixes and enhancements,\nwhich are documented in the README.txt file included with the patch files.\n\nSecurity Fix(es):\n\n* A deserialization flaw allowing remote code execution was found in the\nBeanShell library. If BeanShell was on the classpath, it could permit code\nexecution if another part of the application deserialized objects involving\na specially constructed chain of classes. A remote attacker could use this\nflaw to execute arbitrary code with the permissions of the application\nusing the BeanShell library. (CVE-2016-2510)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:0539",
"url": "https://access.redhat.com/errata/RHSA-2016:0539"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.2.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.2.0"
},
{
"category": "external",
"summary": "1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0539.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.2 update",
"tracking": {
"current_release_date": "2026-05-14T22:23:01+00:00",
"generator": {
"date": "2026-05-14T22:23:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2016:0539",
"initial_release_date": "2016-03-30T18:16:01+00:00",
"revision_history": [
{
"date": "2016-03-30T18:16:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:38:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:23:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss BPMS 6.2",
"product": {
"name": "Red Hat JBoss BPMS 6.2",
"product_id": "Red Hat JBoss BPMS 6.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_bpms:6.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Process Automation Manager"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-2510",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2016-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1310647"
}
],
"notes": [
{
"category": "description",
"text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bsh2: remote code execution via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss BPMS 6.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2510"
},
{
"category": "external",
"summary": "RHBZ#1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510"
},
{
"category": "external",
"summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
}
],
"release_date": "2016-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-03-30T18:16:01+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the update,\nrestart the server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss BPMS 6.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:0539"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss BPMS 6.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bsh2: remote code execution via deserialization"
}
]
}
RHSA-2016:0540
Vulnerability from csaf_redhat - Published: 2016-03-30 18:34 - Updated: 2026-05-14 22:23A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss BRMS 6.2
Red Hat / Red Hat Decision Manager
|
cpe:/a:redhat:jboss_brms:6.2
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss BRMS.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss BRMS is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.2.2 serves as a replacement for Red\nHat JBoss BRMS 6.2.1, and includes bug fixes and enhancements, which are\ndocumented in the README.txt file included with the patch files.\n\nSecurity Fix(es):\n\n* A deserialization flaw allowing remote code execution was found in the\nBeanShell library. If BeanShell was on the classpath, it could permit code\nexecution if another part of the application deserialized objects involving\na specially constructed chain of classes. A remote attacker could use this\nflaw to execute arbitrary code with the permissions of the application\nusing the BeanShell library. (CVE-2016-2510)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:0540",
"url": "https://access.redhat.com/errata/RHSA-2016:0540"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.2.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.2.0"
},
{
"category": "external",
"summary": "1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0540.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.2 update",
"tracking": {
"current_release_date": "2026-05-14T22:23:02+00:00",
"generator": {
"date": "2026-05-14T22:23:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2016:0540",
"initial_release_date": "2016-03-30T18:34:22+00:00",
"revision_history": [
{
"date": "2016-03-30T18:34:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:42:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:23:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss BRMS 6.2",
"product": {
"name": "Red Hat JBoss BRMS 6.2",
"product_id": "Red Hat JBoss BRMS 6.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_brms:6.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Decision Manager"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-2510",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2016-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1310647"
}
],
"notes": [
{
"category": "description",
"text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bsh2: remote code execution via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss BRMS 6.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2510"
},
{
"category": "external",
"summary": "RHBZ#1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510"
},
{
"category": "external",
"summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
}
],
"release_date": "2016-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-03-30T18:34:22+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the update,\nrestart the server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss BRMS 6.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:0540"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss BRMS 6.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bsh2: remote code execution via deserialization"
}
]
}
RHSA-2016:1135
Vulnerability from csaf_redhat - Published: 2016-05-26 19:25 - Updated: 2026-05-14 22:23A denial of service flaw was found in the way the HSLFSlideShow class implementation in Apache POI handled certain PPT files. A remote attacker could submit a specially crafted PPT file that would cause Apache POI to hang indefinitely.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Data Virtualization 6.2
Red Hat / Red Hat JBoss Data Virtualization
|
cpe:/a:redhat:jboss_data_virtualization:6.2
|
— |
Vendor Fix
fix
|
A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Data Virtualization 6.2
Red Hat / Red Hat JBoss Data Virtualization
|
cpe:/a:redhat:jboss_data_virtualization:6.2
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Data Virtualization.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Data Virtualization is a lean data integration solution that\nprovides easy, real-time, and unified data access across disparate sources\nto multiple applications and users. JBoss Data Virtualization makes data\nspread across physically distinct systems - such as multiple databases, XML\nfiles, and even Hadoop systems - appear as a set of tables in a local\ndatabase.\n\nSecurity Fix(es):\n\n* A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library. (CVE-2016-2510)\n\n* A denial of service flaw was found in the way the HSLFSlideShow class implementation in Apache POI handled certain PPT files. A remote attacker could submit a specially crafted PPT file that would cause Apache POI to hang indefinitely. (CVE-2014-9527)\n\nAll users of Red Hat JBoss Data Virtualization 6.2.0 as provided from the\nRed Hat Customer Portal are advised to apply this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:1135",
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.2.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.2.0"
},
{
"category": "external",
"summary": "1181223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181223"
},
{
"category": "external",
"summary": "1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1135.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Data Virtualization security and bug fix update",
"tracking": {
"current_release_date": "2026-05-14T22:23:03+00:00",
"generator": {
"date": "2026-05-14T22:23:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2016:1135",
"initial_release_date": "2016-05-26T19:25:24+00:00",
"revision_history": [
{
"date": "2016-05-26T19:25:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:37:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:23:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Data Virtualization 6.2",
"product": {
"name": "Red Hat JBoss Data Virtualization 6.2",
"product_id": "Red Hat JBoss Data Virtualization 6.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_data_virtualization:6.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Data Virtualization"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-9527",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2014-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1181223"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way the HSLFSlideShow class implementation in Apache POI handled certain PPT files. A remote attacker could submit a specially crafted PPT file that would cause Apache POI to hang indefinitely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-poi: denial of service in HSLFSlideShow via corrupted PPT file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Data Virtualization 6.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-9527"
},
{
"category": "external",
"summary": "RHBZ#1181223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-9527",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9527"
}
],
"release_date": "2014-12-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-05-26T19:25:24+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Data Virtualization installation (including its databases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss Data Virtualization server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the Red Hat JBoss Data Virtualization server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss Data Virtualization 6.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Data Virtualization 6.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-poi: denial of service in HSLFSlideShow via corrupted PPT file"
},
{
"cve": "CVE-2016-2510",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2016-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1310647"
}
],
"notes": [
{
"category": "description",
"text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bsh2: remote code execution via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Data Virtualization 6.2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2510"
},
{
"category": "external",
"summary": "RHBZ#1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510"
},
{
"category": "external",
"summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
}
],
"release_date": "2016-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-05-26T19:25:24+00:00",
"details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Data Virtualization installation (including its databases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss Data Virtualization server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the Red Hat JBoss Data Virtualization server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss Data Virtualization 6.2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:1135"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Data Virtualization 6.2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bsh2: remote code execution via deserialization"
}
]
}
RHSA-2016:1376
Vulnerability from csaf_redhat - Published: 2016-06-30 21:06 - Updated: 2026-05-14 22:23It was found that a prior countermeasure in Apache WSS4J for Bleichenbacher's attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 5.3
Red Hat / Red Hat JBoss SOA Platform
|
cpe:/a:redhat:jboss_enterprise_soa_platform:5.3
|
— |
Vendor Fix
fix
|
It was found that the Java Standard Tag Library (JSTL) allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 5.3
Red Hat / Red Hat JBoss SOA Platform
|
cpe:/a:redhat:jboss_enterprise_soa_platform:5.3
|
— |
Vendor Fix
fix
Workaround
|
A flaw was discovered in the way applications using Groovy used the standard Java serialization mechanism. A remote attacker could use a specially crafted serialized object that would execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 5.3
Red Hat / Red Hat JBoss SOA Platform
|
cpe:/a:redhat:jboss_enterprise_soa_platform:5.3
|
— |
Vendor Fix
fix
Workaround
|
It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 5.3
Red Hat / Red Hat JBoss SOA Platform
|
cpe:/a:redhat:jboss_enterprise_soa_platform:5.3
|
— |
Vendor Fix
fix
Workaround
|
A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 5.3
Red Hat / Red Hat JBoss SOA Platform
|
cpe:/a:redhat:jboss_enterprise_soa_platform:5.3
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss SOA Platform 5.3.1.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss SOA Platform is the next-generation ESB and business process\nautomation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage\nexisting (MoM and EAI), modern (SOA and BPM-Rules), and future (EDA and\nCEP) integration methodologies to dramatically improve business process\nexecution speed and quality.\n\nSecurity Fix(es):\n\n* It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks. (CVE-2016-2141)\n\n* It was found that a prior countermeasure in Apache WSS4J for Bleichenbacher\u0027s attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key. (CVE-2015-0226)\n\n* It was found that the Java Standard Tag Library (JSTL) allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution. (CVE-2015-0254)\n\n* A flaw was discovered in the way applications using Groovy used the standard Java serialization mechanism. A remote attacker could use a specially crafted serialized object that would execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability. (CVE-2015-3253)\n\n* A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library. (CVE-2016-2510)\n\nThe CVE-2016-2141 issue was discovered by Dennis Reed (Red Hat).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:1376",
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/2360521",
"url": "https://access.redhat.com/articles/2360521"
},
{
"category": "external",
"summary": "1191446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191446"
},
{
"category": "external",
"summary": "1198606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198606"
},
{
"category": "external",
"summary": "1243934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934"
},
{
"category": "external",
"summary": "1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "external",
"summary": "1313589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1376.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss SOA Platform security update",
"tracking": {
"current_release_date": "2026-05-14T22:23:10+00:00",
"generator": {
"date": "2026-05-14T22:23:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2016:1376",
"initial_release_date": "2016-06-30T21:06:13+00:00",
"revision_history": [
{
"date": "2016-06-30T21:06:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:39:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:23:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss SOA Platform 5.3",
"product": {
"name": "Red Hat JBoss SOA Platform 5.3",
"product_id": "Red Hat JBoss SOA Platform 5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss SOA Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-0226",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2015-02-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1191446"
}
],
"notes": [
{
"category": "description",
"text": "It was found that a prior countermeasure in Apache WSS4J for Bleichenbacher\u0027s attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wss4j: Apache WSS4J is vulnerable to Bleichenbacher\u0027s attack (incomplete fix for CVE-2011-2487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0226"
},
{
"category": "external",
"summary": "RHBZ#1191446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191446"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0226"
}
],
"release_date": "2015-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-06-30T21:06:13+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform server\nby stopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss SOA\nPlatform server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wss4j: Apache WSS4J is vulnerable to Bleichenbacher\u0027s attack (incomplete fix for CVE-2011-2487)"
},
{
"acknowledgments": [
{
"names": [
"Apache Software Foundation"
]
},
{
"names": [
"David Jorm"
],
"organization": "IIX"
}
],
"cve": "CVE-2015-0254",
"discovery_date": "2015-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1198606"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the Java Standard Tag Library (JSTL) allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users of EAP 6.x and 7.0 should upgrade to at least 6.4.9 and pass the following system property on startup to prevent XXE attacks in JSTL:\norg.apache.taglibs.standard.xml.accessExternalEntity=false\n\nFor more details please see refer to this KCS solution:\nhttps://access.redhat.com/solutions/1584363",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0254"
},
{
"category": "external",
"summary": "RHBZ#1198606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0254",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0254"
}
],
"release_date": "2015-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-06-30T21:06:13+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform server\nby stopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss SOA\nPlatform server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"category": "workaround",
"details": "Users should upgrade to Apache Standard Taglibs 1.2.3 or later.\n\nThis version uses JAXP\u2019s FEATURE_SECURE_PROCESSING to restrict XML processing. Depending on the Java runtime version in use, additional configuration may be required:\n\nJava8:\nExternal entity access is automatically disabled if a SecurityManager is active.\n\nJava7:\nJAXP properties may need to be used to disable external access. See http://docs.oracle.com/javase/tutorial/jaxp/properties/properties.html\n\nJava6 and earlier:\nA new system property org.apache.taglibs.standard.xml.accessExternalEntity may be used to specify the protocols that can be used to access external entities. This defaults to \"all\" if no SecurityManager is present and to \"\" (thereby disabling access) if a SecurityManager is detected.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
"version": "3.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags"
},
{
"cve": "CVE-2015-3253",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2015-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1243934"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the way applications using Groovy used the standard Java serialization mechanism. A remote attacker could use a specially crafted serialized object that would execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "groovy: remote execution of untrusted code in class MethodClosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3253"
},
{
"category": "external",
"summary": "RHBZ#1243934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3253",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3253"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253"
},
{
"category": "external",
"summary": "http://seclists.org/oss-sec/2015/q3/121",
"url": "http://seclists.org/oss-sec/2015/q3/121"
}
],
"release_date": "2015-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-06-30T21:06:13+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform server\nby stopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss SOA\nPlatform server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"category": "workaround",
"details": "Apply the following patch on the MethodClosure class (src/main/org/codehaus/groovy/runtime/MethodClosure.java):\n\n public class MethodClosure extends Closure {\n + private Object readResolve() {\n + throw new UnsupportedOperationException();\n + \n }\n\nAlternatively, you should make sure to use a custom security policy file (using the standard Java security manager) or make sure that you do not rely on serialization to communicate remotely.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "groovy: remote execution of untrusted code in class MethodClosure"
},
{
"acknowledgments": [
{
"names": [
"Dennis Reed"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2016-2141",
"discovery_date": "2015-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1313589"
}
],
"notes": [
{
"category": "description",
"text": "It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JGroups: Authorization bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2141"
},
{
"category": "external",
"summary": "RHBZ#1313589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2141",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141"
}
],
"release_date": "2016-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-06-30T21:06:13+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform server\nby stopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss SOA\nPlatform server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"category": "workaround",
"details": "Please refer to https://access.redhat.com/articles/2360521 for more information.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JGroups: Authorization bypass"
},
{
"cve": "CVE-2016-2510",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2016-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1310647"
}
],
"notes": [
{
"category": "description",
"text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bsh2: remote code execution via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2510"
},
{
"category": "external",
"summary": "RHBZ#1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510"
},
{
"category": "external",
"summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
}
],
"release_date": "2016-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-06-30T21:06:13+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform server\nby stopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss SOA\nPlatform server by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bsh2: remote code execution via deserialization"
}
]
}
RHSA-2016:2035
Vulnerability from csaf_redhat - Published: 2016-10-06 16:18 - Updated: 2026-05-14 22:23A denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
|
It was found that use of a JMS ObjectMessage does not safely handle user supplied data when deserializing objects. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
Workaround
|
It was found that Apache Camel's camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
|
It was found that Apache Camel's Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability. If using camel-jetty, or camel-servlet as a consumer in Camel routes, then Camel will automatically de-serialize HTTP requests that uses the content-header: application/x-java-serialized-object.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
|
It was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries.
CWE-358 - Improperly Implemented Security Check for Standard| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
|
It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
Workaround
|
A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
|
It was found that Apache Shiro uses a default cipher key for its "remember me" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Fuse 6.3
Red Hat / Red Hat JBoss Fuse
|
cpe:/a:redhat:jboss_fuse:6.3
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Fuse 6.3, which fixes multiple security issues and includes several bug fixes and enhancements, is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform.\n\nRed Hat JBoss Fuse 6.3 is a minor product release that updates Red Hat JBoss Fuse 6.2.1, and includes several bug fixes and enhancements. Refer to the Release Notes document, available from the Product Documentation link in the References section, for a list of these changes.\n\nSecurity Fix(es):\n\nIt was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks. (CVE-2016-2141)\n\nA deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library. (CVE-2016-2510)\n\nIt was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content. (CVE-2016-4437)\n\nA denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed. (CVE-2015-3192)\n\nIt was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks. (CVE-2015-5344)\n\nIt was found that Apache Camel\u0027s Jetty/Servlet permitted object deserialization. If using camel-jetty or camel-servlet as a consumer in Camel routes, then Camel will automatically deserialize HTTP requests that use the content-header: application/x-java-serialized-object. An attacker could use this vulnerability to gain access to unauthorized information or conduct further attacks. (CVE-2015-5348)\n\nIt was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries. (CVE-2015-7940)\n\nThe CVE-2016-2141 issue was discovered by Dennis Reed (Red Hat).\n\nRefer to the Product Documentation link in the References section for installation instructions.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2035",
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.3.0"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3",
"url": "https://access.redhat.com/documentation/en/red-hat-jboss-fuse/?version=6.3"
},
{
"category": "external",
"summary": "1239002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002"
},
{
"category": "external",
"summary": "1276272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272"
},
{
"category": "external",
"summary": "1292849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849"
},
{
"category": "external",
"summary": "1303609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609"
},
{
"category": "external",
"summary": "1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "external",
"summary": "1313589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589"
},
{
"category": "external",
"summary": "1343346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2035.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update",
"tracking": {
"current_release_date": "2026-05-14T22:23:10+00:00",
"generator": {
"date": "2026-05-14T22:23:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2016:2035",
"initial_release_date": "2016-10-06T16:18:07+00:00",
"revision_history": [
{
"date": "2016-10-06T16:18:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:38:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:23:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Fuse 6.3",
"product": {
"name": "Red Hat JBoss Fuse 6.3",
"product_id": "Red Hat JBoss Fuse 6.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_fuse:6.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Fuse"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-3192",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1239002"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way Spring processes inline DTD declarations. A remote attacker could submit a specially crafted XML file that would cause out-of-memory errors when parsed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Framework: denial-of-service attack with XML input",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3192"
},
{
"category": "external",
"summary": "RHBZ#1239002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1239002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3192"
},
{
"category": "external",
"summary": "http://pivotal.io/security/cve-2015-3192",
"url": "http://pivotal.io/security/cve-2015-3192"
}
],
"release_date": "2015-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Framework: denial-of-service attack with XML input"
},
{
"cve": "CVE-2015-5254",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2015-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1291292"
}
],
"notes": [
{
"category": "description",
"text": "It was found that use of a JMS ObjectMessage does not safely handle user supplied data when deserializing objects. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ObjectMessage: unsafe deserialization",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A malicious message producer needs to authenticate to EAP in order to send messages. Also, the use of JMS ObjectMessage needs to be chosen by the developer of the application. Therefore this issue is rated as moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-5254"
},
{
"category": "external",
"summary": "RHBZ#1291292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-5254",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5254"
},
{
"category": "external",
"summary": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt",
"url": "http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt"
}
],
"release_date": "2015-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
},
{
"category": "workaround",
"details": "If you do deploy a JMS publisher, and subscriber, and don\u0027t trust the messages sent to you by your clients, you could mitigate this issue by installing a Java agent which restricts the classes which can be deserialized. This is an article with the recommended approach:\n\nhttps://access.redhat.com/solutions/2190911\n\nYou could also mitigate this issue using the features of the Java Virtual Machine added in JEP 290:\n\nhttp://openjdk.java.net/jeps/290",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ObjectMessage: unsafe deserialization"
},
{
"cve": "CVE-2015-5344",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2016-01-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1303609"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Apache Camel\u0027s camel-xstream component was vulnerable to Java object deserialization. This vulnerability permits deserialization of data which could lead to information disclosure, code execution, or other possible attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "camel-xstream: Java object de-serialization vulnerability leads to RCE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-5344"
},
{
"category": "external",
"summary": "RHBZ#1303609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303609"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5344"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5344"
},
{
"category": "external",
"summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2",
"url": "https://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc?version=1\u0026modificationDate=1454056803000\u0026api=v2"
}
],
"release_date": "2015-11-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "camel-xstream: Java object de-serialization vulnerability leads to RCE"
},
{
"cve": "CVE-2015-5348",
"discovery_date": "2015-12-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1292849"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Apache Camel\u0027s Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability. If using camel-jetty, or camel-servlet as a consumer in Camel routes, then Camel will automatically de-serialize HTTP requests that uses the content-header: application/x-java-serialized-object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Camel: Java object deserialisation in Jetty/Servlet",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-5348"
},
{
"category": "external",
"summary": "RHBZ#1292849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292849"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-5348",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5348"
},
{
"category": "external",
"summary": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt",
"url": "https://camel.apache.org/security-advisories.data/CVE-2015-5348.txt"
}
],
"release_date": "2015-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Camel: Java object deserialisation in Jetty/Servlet"
},
{
"cve": "CVE-2015-7940",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2015-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1276272"
}
],
"notes": [
{
"category": "description",
"text": "It was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: Invalid curve attack allowing to extract private keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-7940"
},
{
"category": "external",
"summary": "RHBZ#1276272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7940"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7940"
}
],
"release_date": "2015-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: Invalid curve attack allowing to extract private keys"
},
{
"acknowledgments": [
{
"names": [
"Dennis Reed"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2016-2141",
"discovery_date": "2015-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1313589"
}
],
"notes": [
{
"category": "description",
"text": "It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JGroups: Authorization bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2141"
},
{
"category": "external",
"summary": "RHBZ#1313589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2141",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2141"
}
],
"release_date": "2016-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
},
{
"category": "workaround",
"details": "Please refer to https://access.redhat.com/articles/2360521 for more information.",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JGroups: Authorization bypass"
},
{
"cve": "CVE-2016-2510",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2016-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1310647"
}
],
"notes": [
{
"category": "description",
"text": "A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bsh2: remote code execution via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2510"
},
{
"category": "external",
"summary": "RHBZ#1310647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2510"
},
{
"category": "external",
"summary": "https://github.com/beanshell/beanshell/releases/tag/2.0b6",
"url": "https://github.com/beanshell/beanshell/releases/tag/2.0b6"
}
],
"release_date": "2016-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bsh2: remote code execution via deserialization"
},
{
"cve": "CVE-2016-4437",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1343346"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Apache Shiro uses a default cipher key for its \"remember me\" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "shiro: Security constraint bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-4437"
},
{
"category": "external",
"summary": "RHBZ#1343346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-4437",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4437"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-06T16:18:07+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2035"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat JBoss Fuse 6.3"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "shiro: Security constraint bypass"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.