Description
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
Remediation
References
http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html
http://geronimo.apache.org/30x-security-report.html
http://www-01.ibm.com/support/docview.wss?uid=swg21643282
https://issues.apache.org/jira/browse/GERONIMO-6477
Related Vulnerabilities
CVE-2023-25764 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2022-41225 Vulnerability in maven package org.jenkins-ci.plugins:anchore-container-scanner
CVE-2022-28157 Vulnerability in maven package com.surenpi.jenkins:phoenix-autotest
CVE-2011-3375 Vulnerability in maven package org.apache.tomcat:coyote
CVE-2020-2317 Vulnerability in maven package org.jvnet.hudson.plugins.findbugs:parent