9.8
CVSSv3

CVE-2015-7501

Published: 09/11/2017 Updated: 16/02/2024
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 892
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote malicious users to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat jboss operations network 3.0

redhat jboss a-mq 6.0.0

redhat jboss enterprise application platform 4.3.0

redhat jboss enterprise application platform 6.0.0

redhat jboss bpm suite 6.0.0

redhat jboss enterprise brms platform 5.0.0

redhat openshift 3.0

redhat jboss enterprise brms platform 6.0.0

redhat jboss fuse 6.0.0

redhat subscription asset manager 1.3.0

redhat jboss fuse service works 6.0

redhat jboss enterprise soa platform 5.0.0

redhat jboss enterprise application platform 5.0.0

redhat jboss enterprise web server 3.0.0

redhat jboss portal 6.0.0

redhat jboss data virtualization 6.0.0

redhat jboss data virtualization 5.0.0

redhat xpaas 3.0.0

redhat data grid 6.0.0

Vendor Advisories

It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform 63 security update Type/Severity Security Advisory: Critical Topic Updated packages that fix one security issue for the Apachecommons-collections library for Red Hat JBoss Enterprise ApplicationPlatform 63 are now available for Red Hat Enter ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform 64 security update Type/Severity Security Advisory: Critical Topic Updated packages for the Apache commons-collections library for Red HatJBoss Enterprise Application Platform 64, which fix one security issue,are now available for Red Hat En ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform 52 security update Type/Severity Security Advisory: Critical Topic Updated packages for the Apache commons-collections library for Red HatJBoss Enterprise Application Platform 52, which fix one security issue,are now available for Red Hat En ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform security update Type/Severity Security Advisory: Critical Topic Updated packages for the Apache commons-collections library, which fix onesecurity issue, are now available for Red Hat JBoss Enterprise ApplicationPlatform 52, 512, and 4310 ...
Synopsis Important: rh-maven35-apache-commons-collections4 security update Type/Severity Security Advisory: Important Topic An update for rh-maven35-apache-commons-collections4 is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Imp ...
Synopsis Important: apache-commons-collections security update Type/Severity Security Advisory: Important Topic Updated apache-commons-collections packages that fix one security issue arenow available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having Important securityi ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform 645 update Type/Severity Security Advisory: Critical Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform645 and fix two security issues, several bugs, and add variousenhancements are now available for Red Hat ...
Synopsis Important: jakarta-commons-collections security update Type/Severity Security Advisory: Important Topic Updated jakarta-commons-collections packages that fix one security issueare now available for Red Hat Enterprise Linux 5Red Hat Product Security has rated this update as having Important securit ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform 645 jboss-ec2-eap update Type/Severity Security Advisory: Critical Topic Updated jboss-ec2-eap packages that fix two security issues, several bugs,and add various enhancements are now available for Red Hat JBoss EnterpriseApplication Platfor ...
Synopsis Important: OpenShift Container Platform 469 security and bug fix update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Container Platform release 469 is now available with updates to packages and images that fix several bugs and add enhancementsThis release also includes a ...
Synopsis Important: jakarta-commons-collections security update Type/Severity Security Advisory: Important Topic Updated jakarta-commons-collections packages that fix one security issueare now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Important securit ...
Synopsis Important: rh-java-common-apache-commons-collections security update Type/Severity Security Advisory: Important Topic Updated rh-java-common-apache-commons-collections packages which fix onesecurity issue are now available for Red Hat Software Collections 2Red Hat Product Security has rated this u ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform 645 update Type/Severity Security Advisory: Critical Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform645 and fix two security issues, several bugs, and add variousenhancements are now available for Red Hat ...
Synopsis Critical: Red Hat JBoss Enterprise Application Platform 645 update Type/Severity Security Advisory: Critical Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform645 and fix two security issues, several bugs, and add variousenhancements are now available for Red Hat ...
It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library ...

Github Repositories

A Java agent that disables platform features you don't use, before an attacker uses them against you.

aegis4j Avoid the NEXT Log4Shell vulnerability! The Java platform has accrued a number of features over the years Some of these features are no longer commonly used, but their existence remains a security liability, providing attackers with a diverse toolkit to leverage against Java-based systems It is possible to eliminate some of this attack surface area by creating custom

一个简单探测jboss漏洞的工具 批量探测jboos系列漏洞路径,特别在内网渗透中,提高效率。(此工具仅探测漏洞所在路径,漏洞是否存还需对应exp验证。) 介绍 CVE-2015-7501 JBoss JMXInvokerServlet 反序列化漏洞。此漏洞存在于JBoss中/invoker/JMXInvokerServlet路径。访问若提示下载JMXInvokerServlet,则可

Writeups for rooms on the TryHackMe platform

Try Hack Me Rooms Attacker Using TryHackMe to learn and practice hacker skillz Writeups for rooms on the TryHackMe platform Room WriteUp Difficulty Tags ide Easy enumeration : FTP : Public-Exploit : PrivEsc dockerrodeo Medium docker playground : showcase : walkthrough cyberheroes Easy enumeration : authentication : bypass Juicy Details Easy Blue Team : Securi

JBoss漏洞扫描工具

#JBoss POC 包含 CVE-2015-7501、CVE-2017-7504、CVE-2017-12149等漏洞扫描,会将漏洞结果保存在txt文件 Usage: python3 jbosspy -h

扫描jboss常见漏洞路径是否存在。

一个简单探测jboss漏洞的工具 批量探测jboos系列漏洞路径,特别在内网渗透中,提高效率。(此工具仅探测漏洞所在路径,漏洞是否存还需对应exp验证。) 介绍 CVE-2015-7501 JBoss JMXInvokerServlet 反序列化漏洞。此漏洞存在于JBoss中/invoker/JMXInvokerServlet路径。访问若提示下载JMXInvokerServlet,则可

References

CWE-502https://bugzilla.redhat.com/show_bug.cgi?id=1279330https://access.redhat.com/solutions/2045023https://access.redhat.com/security/vulnerabilities/2059393http://www.securitytracker.com/id/1037640http://www.securitytracker.com/id/1037053http://www.securitytracker.com/id/1037052http://www.securitytracker.com/id/1034097http://www.securityfocus.com/bid/78215https://rhn.redhat.com/errata/RHSA-2015-2536.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1773.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0040.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2671.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2670.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2524.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2522.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2521.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2517.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2516.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2514.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2502.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2501.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2500.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://security.netapp.com/advisory/ntap-20240216-0010/https://nvd.nist.govhttps://alas.aws.amazon.com/ALAS-2015-618.htmlhttps://github.com/gredler/aegis4j