Overview
Several Java implementations of AMF3 are vulnerable to insecure deserialization and XML external entities references.
Description
Several Java implementations of Action Message Format (AMF3) are vulnerable to one or more of the following implementation errors: CWE-502: Deserialization of Untrusted Data |
Impact
A remote attacker with the ability to spoof or control a server connection may be able to send serialized Java objects that execute arbitrary code when deserialized. |
Solution
Apply an update if available |
Developers should use an updated JDK |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 8.4 | E:POC/RL:U/RC:C |
Environmental | 6.3 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Markus Wulftange for reporting this vulnerability.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2015-3269, CVE-2016-2340, CVE-2017-5641, CVE-2017-5983, CVE-2017-3199, CVE-2017-3200, CVE-2017-3201, CVE-2017-3202, CVE-2017-3203, CVE-2017-3206, CVE-2017-3207, CVE-2017-3208 |
Date Public: | 2017-04-04 |
Date First Published: | 2017-04-04 |
Date Last Updated: | 2017-04-14 15:08 UTC |
Document Revision: | 90 |