TROYANOSYVIRUS
Volver a CVEs

CVE-2019-10086

HIGH
7.3

Descripcion

In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.

Detalles CVE

Puntuacion CVSS v3.17.3
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado8/20/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

apache:commons_beanutilsapache:nifidebian:debian_linuxfedoraproject:fedoraopensuse:leaporacle:agile_plmoracle:agile_product_lifecycle_management_integration_packoracle:application_testing_suiteoracle:banking_platformoracle:blockchain_platformoracle:communications_billing_and_revenue_managementoracle:communications_billing_and_revenue_management_elastic_charging_engineoracle:communications_cloud_native_core_consoleoracle:communications_cloud_native_core_policyoracle:communications_cloud_native_core_unified_data_repositoryoracle:communications_convergenceoracle:communications_design_studiooracle:communications_evolved_communications_application_serveroracle:communications_metasolv_solutionoracle:communications_network_integrityoracle:communications_performance_intelligence_centeroracle:communications_pricing_design_centeroracle:communications_unified_inventory_managementoracle:customer_management_and_segmentation_foundationoracle:enterprise_manager_for_virtualizationoracle:financial_services_revenue_management_and_billing_analyticsoracle:flexcube_private_bankingoracle:fusion_middlewareoracle:healthcare_foundationoracle:hospitality_opera_5oracle:hospitality_reporting_and_analyticsoracle:insurance_data_gatewayoracle:jd_edwards_enterpriseone_orchestratororacle:jd_edwards_enterpriseone_toolsoracle:peoplesoft_enterprise_peopletoolsoracle:peoplesoft_enterprise_pt_peopletoolsoracle:primavera_gatewayoracle:real-time_decisions_solutionsoracle:retail_advanced_inventory_planningoracle:retail_back_officeoracle:retail_central_officeoracle:retail_invoice_matchingoracle:retail_merchandising_systemoracle:retail_point-of-serviceoracle:retail_predictive_application_serveroracle:retail_price_managementoracle:retail_returns_managementoracle:retail_xstore_point_of_serviceoracle:service_busoracle:solaris_clusteroracle:time_and_labororacle:utilities_frameworkoracle:weblogic_serverredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:jboss_enterprise_application_platform

Debilidades (CWE)

CWE-502

Referencias

https://access.redhat.com/errata/RHSA-2019:4317(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0057(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0194(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0804(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0805(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0806(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0811(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com//security-alerts/cpujul2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuApr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.