Description
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
Remediation
References
https://issues.apache.org/jira/browse/GERONIMO-6477
http://geronimo.apache.org/30x-security-report.html
http://www-01.ibm.com/support/docview.wss?uid=swg21643282
http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html
Related Vulnerabilities
CVE-2019-10401 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2017-1000403 Vulnerability in maven package org.jvnet.hudson.plugins:speaks
CVE-2018-3820 Vulnerability in npm package kibana
CVE-2019-10467 Vulnerability in maven package org.jenkins-ci.plugins:sonar-gerrit
CVE-2018-11786 Vulnerability in maven package org.apache.karaf.shell:org.apache.karaf.shell.core