Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12149

KEV · Ransomware EPSS 94.29% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-12149

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat JBoss Enterprise Application Platform Jboss Application Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat JBoss Enterprise Application Platform(EAP)是美国红帽(Red Hat)公司的一套开源、基于J2EE的中间件平台。该平台主要用于构建、部署和托管Java应用程序与服务。Jboss Application Server是其中的一款基于JavaEE的开源的应用服务器。 Red Hat Jboss EAP 5.0版本中附带的Jboss Application Server存在远程代码执行漏洞。远程攻击者可借助特制的序列化数据利用该漏洞在受影响应用程序上下文
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Red Hat, Inc.jbossas n/a -

II. Public POCs for CVE-2017-12149

#POC DescriptionSource LinkShenlong Link
1CVE-2017-12149 JBOSS as 6.X反序列化(反弹shell版)https://github.com/sevck/CVE-2017-12149POC Details
2CVE-2017-12149 jboss反序列化 可回显https://github.com/yunxu1/jboss-_CVE-2017-12149POC Details
3CVE-2017-12149 JBOSS RCE (TESTED) https://github.com/1337g/CVE-2017-12149POC Details
4Jboss Java Deserialization RCE (CVE-2017-12149)https://github.com/jreppiks/CVE-2017-12149POC Details
5JBoss CVE-2017-12149 (Insecure Deserialization - RCE) Exploitation Lab.https://github.com/Xcatolin/jboss-deserializationPOC Details
6Nonehttps://github.com/VVeakee/CVE-2017-12149POC Details
7Nonehttps://github.com/MrE-Fog/jboss-_CVE-2017-12149POC Details
8Update of https://github.com/1337g/CVE-2017-12149 to work with python3https://github.com/JesseClarkND/CVE-2017-12149POC Details
9Nonehttps://github.com/zesnd/cve-2017-12149POC Details
10Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2 is susceptible to a remote code execution vulnerability because the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization, thus allowing an attacker to execute arbitrary code via crafted serialized data.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-12149.yamlPOC Details
11Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/JBoss%205.x6.x%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%20CVE-2017-12149.mdPOC Details
12https://github.com/vulhub/vulhub/blob/master/jboss/CVE-2017-12149/README.mdPOC Details
13Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/JBoss%205.x%206.x%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%20CVE-2017-12149.mdPOC Details
14Nonehttps://github.com/galois17/cve-2017-12149-playgroundPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-12149

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2017-12149

No comments yet


Leave a comment