10
CVSSv2

CVE-2013-0422

Published: 10/01/2013 Updated: 21/02/2014
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote malicious users to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle jre 1.7.0

oracle jdk 1.7.0

Vendor Advisories

OpenJDK 7 could be made to crash or run programs as your login if it opened a specially crafted Java applet ...
Synopsis Critical: java-170-oracle security update Type/Severity Security Advisory: Critical Topic Updated java-170-oracle packages that fix two security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having critical ...
Synopsis Important: java-170-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-170-openjdk packages that fix two security issues are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimportant security ...
Synopsis Critical: java-170-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-170-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalse ...

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' require 'rex' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking includ ...

Github Repositories

penetration 收集的渗透资料,现在分享一下 点个小星星呗~ 欢迎继续提供相关资料,可以issue或者pull request 收集不易 分享请注明来源~ githubcom/w1109790800/Permeable 目录结构 ├─0day & exp │ ├─08CMS │ ├─AKCMS │ ├─bbsxp │ │ ├─BBSxp70 │ │ ├─bbsxp综合利用工具 │

Ever Store cookie in many different ways to track players and/or send persistent messages across multiple casino's This is a personal little package, so use however you wish but expect nothing as it's specific to be for casino Messages This is to be embedded in 0/1px iframes within a page It will then stream the user data whatever you wish through postMessage(), s

penetration 收集的渗透资料,现在分享一下 点个小星星呗~ 欢迎继续提供相关资料,可以issue或者pull request 收集不易 分享请注明来源~ githubcom/w1109790800/Permeable 欢迎关注我的公众号: 目录结构 ├─0day & exp │ ├─08CMS │ ├─AKCMS │ ├─bbsxp │ │ ├─BBSxp70 │ │ ├

penetration 收集的渗透资料,现在分享一下 地址githubcom/w1109790800原文地址 pg)## 目录结构 ├─0day & exp │ ├─08CMS │ ├─AKCMS │ ├─bbsxp │ │ ├─BBSxp70 │ │ ├─bbsxp综合利用工具 │ │ └─BBSXP论坛漏洞完全注册工具 │ ├─BLUECMS │ ├─CreateLiveCMS │ ├─discuz

Testing Privacy on Popular Browsers Project Goals In the modern day, internet browsers are increasingly advertising their privacy-preserving features, with browsers such as Brave touting themselves as being "on a mission to protect your privacy online" Our project aims to investigate popular browsers' evasiveness against cross-site tracking We also aim to answe

Java Applet Persistence for Evercookie

Java Applet Persistence for Evercookie What's this? A Java applet implementing a storage mechanism for Evercookie that uses several methods to store persistent cookie data in a browser evercookie-applet was written by Gabriel Bauman and binaries will soon be included in the official Evercookie distribution You can find out more about Evercookie here How does it work? Ev

渗透 超全面的渗透资料💯 包含:0day,xss,sql注入,提权……

penetration 收集的渗透资料,现在分享一下 地址githubcom/w1109790800原文地址 pg)## 目录结构 ├─0day & exp │ ├─08CMS │ ├─AKCMS │ ├─bbsxp │ │ ├─BBSxp70 │ │ ├─bbsxp综合利用工具 │ │ └─BBSXP论坛漏洞完全注册工具 │ ├─BLUECMS │ ├─CreateLiveCMS │ ├─discuz

evercookie gem for Ruby on Rails

Evercookie¶ ↑ <img src=“travis-ciorg/daddyz/evercookiepng?branch=master” alt=“Build Status” /> <img src=“badgefuryio/rb/evercookiepng” alt=“Gem Version” /> <img src=“codeclimatecom/github/daddyz/evercookiepng” /> Evercookie is a gem al

pagina wena

Evercookie Evercookie is a Javascript API that produces extremely persistent cookies in a browser Its goal is to identify a client even after they've removed standard cookies, Flash cookies (Local Shared Objects or LSOs), and others This is accomplished by storing the cookie data as many browser storage mechanisms as possible If cookie data is removed from any of the st

penetration 收集的渗透资料,现在分享一下 点个小星星呗~ 欢迎继续提供相关资料,可以issue或者pull request 收集不易 分享请注明来源~ githubcom/w1109790800/Permeable 目录结构 ├─0day & exp │ ├─08CMS │ ├─AKCMS │ ├─bbsxp │ │ ├─BBSxp70 │ │ ├─bbsxp综合利用工具 │

Evercookie Evercookie is a Javascript API that produces extremely persistent cookies in a browser Its goal is to identify a client even after they've removed standard cookies, Flash cookies (Local Shared Objects or LSOs), and others This is accomplished by storing the cookie data as many browser storage mechanisms as possible If cookie data is removed from any of the st

penetration 收集的渗透资料,现在分享一下 地址githubcom/w1109790800原文地址 pg)## 目录结构 ├─0day & exp │ ├─08CMS │ ├─AKCMS │ ├─bbsxp │ │ ├─BBSxp70 │ │ ├─bbsxp综合利用工具 │ │ └─BBSXP论坛漏洞完全注册工具 │ ├─BLUECMS │ ├─CreateLiveCMS │ ├─discuz

Produces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Flash cookies (LSOs), HTML5 storage, SilverLight storage, and others.

Evercookie Evercookie is a Javascript API that produces extremely persistent cookies in a browser Its goal is to identify a client even after they've removed standard cookies, Flash cookies (Local Shared Objects or LSOs), and others This is accomplished by storing the cookie data on as many browser storage mechanisms as possible If cookie data is removed from any of the

Evercookie Evercookie is a Javascript API that produces extremely persistent cookies in a browser Its goal is to identify a client even after they've removed standard cookies, Flash cookies (Local Shared Objects or LSOs), and others This is accomplished by storing the cookie data on as many browser storage mechanisms as possible If cookie data is removed from any of the

Evercookie Evercookie is a Javascript API that produces extremely persistent cookies in a browser Its goal is to identify a client even after they've removed standard cookies, Flash cookies (Local Shared Objects or LSOs), and others This is accomplished by storing the cookie data on as many browser storage mechanisms as possible If cookie data is removed from any of the

Evercookie related research and scripts.

Equable Destruction v 20230319 author: @southwickIO Overview This app is under development Evercookie related research and scripts to find evercookies Research was framed around OP's creation Current task: Working on FindSessionStoragepy and getting LDBDumppy nd MozLZ4apy incorporated Script Order

Recent Articles

Investigation Report for the September 2014 Equation malware detection incident in the US
Securelist • Kaspersky Lab • 16 Nov 2017

In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employee’s home computer system. Given that Kaspersky Lab has been at the forefront of fighting cyberespionage and cybercriminal activities on the Internet for over 20 years now, these allegations were treated very seriously. To assist any independent investigators and all the people who have been asking us questions whether those allegations were tr...

Pr0n-optimised Icepol Trojan's servers seized by Romanian cops
The Register • John Leyden • 03 Feb 2014

Police impound servers and neutralise threat - for now

Romanian police have seized servers associated with the Icepol ransomware scam, effectively taking down the pervasive threat for now. The Icepol Trojan extorted victims who downloaded it by sending prospective marks a fake message from local police accusing them of downloading copyrighted material or illegal pornography. The malware locked a victim's desktop before demanding a payment in return for unlocking it. Icepol was programmed to push out its warnings in one of 25 languages, making it som...

Java under attack – the evolution of exploits in 2012-2013
Securelist • Kaspersky Lab • 30 Oct 2013

One of the biggest problems facing the IT security industry is the use of vulnerabilities in legitimate software to launch malware attacks. Malicious programs can use these vulnerabilities to infect a computer without attracting the attention of the user – and, in some cases, without triggering an alert from security software. That’s why cyber criminals prefer these attacks, known as exploits, over other infection methods. Unlike social engineering, which can be hit or miss, the use of vulne...

The Icefog APT: Frequently Asked Questions
Securelist • GReAT • 26 Sep 2013

Here are answers to the most frequently asked questions related to Icefog, an APT operation targeting entities in Japan and South Korea. Icefog refers to a cyber-espionage campaign that has been active at least since 2011. It targets governmental institutions, military contractors, maritime and ship-building groups, telecom operators, satellite operators, industrial and high technology companies and mass media, mainly in South Korea and Japan. It is likely that the crew targets organizations in ...

Anti-decompiling techniques in malicious Java Applets
Securelist • Vicente Diaz • 19 Aug 2013

While I was investigating the Trojan.JS.Iframe.aeq case (see blogpost) one of the files dropped by the Exploit Kit was an Applet exploiting a vulnerability: So basically I unzipped the .jar and took a look using JD-GUI, a java decompiler. These were the resulting classes inside the .jar file: The class names are weird, but nothing unusual. Usually the Manifest states the entry point (main class) of the applet. In this case there was no manifest, but we could see this in the applet call from the ...

Visit From an Old Friend: Counter.php
Securelist • Vicente Diaz • 12 Aug 2013

Around one year ago I posted about what were the most common web attacks in Spain and how the malware was spread. It is time for an update! We regularly collect data regarding infected web sites based in our detections on KSN. Apart from the general verdicts that I usually find in the top of the rank, there was another one in the top 3 for the last months that caught my eye: Trojan.JS.Iframe.aeq. This verdict was quite popular during the last months specially in .ES sites. The detection shows th...

Latest Java patch is not enough, warns US gov: Axe plugins NOW
The Register • John Leyden • 15 Jan 2013

Metasploit boss says Oracle needs TWO years to make everything good

Security experts advise users to not run Java in their web browsers despite a patch from Oracle that mitigates a widely exploited security vulnerability. The database giant issued an emergency out-of-band patch on Sunday, but despite this the US Department of Homeland Security continues to warn citizens to disable Java plugins. "Unless it is absolutely necessary to run Java in web browsers, disable it even after updating to [Java 7 update 11]," the US-CERT team said in an update yesterday. "This...

Java 0day Mass Exploit Distribution
Securelist • Kurt Baumgartner • 09 Jan 2013

Just a quick note, it’s only the second week of January, but early 2013 brings with it the first Java 0day mass exploit distribution of the year. There appears to be multiple ad networks redirecting to Blackhole sites, amplifying the mass exploitation problem. We have seen ads from legitimate sites, especially in the UK, Brazil, and Russia, redirecting to domains hosting the current Blackhole implementation delivering the Java 0day. These sites include weather sites, news sites, and of course,...

References