Description
The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
Remediation
References
http://www.zerodayinitiative.com/advisories/ZDI-15-638
http://www.securityfocus.com/bid/79204
http://tomee-openejb.979440.n4.nabble.com/Document-resolved-vulnerability-CVE-2015-8581-td4678073.html
http://tomee.apache.org/security/tomee.html
http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html
http://www.securityfocus.com/archive/1/537806/100/0/threaded
Related Vulnerabilities
CVE-2022-31147 Vulnerability in maven package org.webjars:jquery-validation
CVE-2020-26288 Vulnerability in npm package parse-server
CVE-2016-6795 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2014-6071 Vulnerability in maven package org.webjars:jquery
CVE-2021-4264 Vulnerability in maven package org.webjars.bower:dustjs-linkedin