TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2019-10086

HIGH
7.3

Beschreibung

In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.

CVE Details

CVSS v3.1 Bewertung7.3
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht8/20/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

apache:commons_beanutilsapache:nifidebian:debian_linuxfedoraproject:fedoraopensuse:leaporacle:agile_plmoracle:agile_product_lifecycle_management_integration_packoracle:application_testing_suiteoracle:banking_platformoracle:blockchain_platformoracle:communications_billing_and_revenue_managementoracle:communications_billing_and_revenue_management_elastic_charging_engineoracle:communications_cloud_native_core_consoleoracle:communications_cloud_native_core_policyoracle:communications_cloud_native_core_unified_data_repositoryoracle:communications_convergenceoracle:communications_design_studiooracle:communications_evolved_communications_application_serveroracle:communications_metasolv_solutionoracle:communications_network_integrityoracle:communications_performance_intelligence_centeroracle:communications_pricing_design_centeroracle:communications_unified_inventory_managementoracle:customer_management_and_segmentation_foundationoracle:enterprise_manager_for_virtualizationoracle:financial_services_revenue_management_and_billing_analyticsoracle:flexcube_private_bankingoracle:fusion_middlewareoracle:healthcare_foundationoracle:hospitality_opera_5oracle:hospitality_reporting_and_analyticsoracle:insurance_data_gatewayoracle:jd_edwards_enterpriseone_orchestratororacle:jd_edwards_enterpriseone_toolsoracle:peoplesoft_enterprise_peopletoolsoracle:peoplesoft_enterprise_pt_peopletoolsoracle:primavera_gatewayoracle:real-time_decisions_solutionsoracle:retail_advanced_inventory_planningoracle:retail_back_officeoracle:retail_central_officeoracle:retail_invoice_matchingoracle:retail_merchandising_systemoracle:retail_point-of-serviceoracle:retail_predictive_application_serveroracle:retail_price_managementoracle:retail_returns_managementoracle:retail_xstore_point_of_serviceoracle:service_busoracle:solaris_clusteroracle:time_and_labororacle:utilities_frameworkoracle:weblogic_serverredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:jboss_enterprise_application_platform

Schwachen (CWE)

CWE-502

Referenzen

https://access.redhat.com/errata/RHSA-2019:4317(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0057(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0194(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0804(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0805(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0806(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0811(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com//security-alerts/cpujul2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuApr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.