8.1
CVSSv3

CVE-2016-2510

Published: 07/04/2016 Updated: 20/10/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

BeanShell (bsh) prior to 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote malicious users to execute arbitrary code via crafted serialized data, related to XThis.Handler.

Vulnerable Product Search on Vulmon Subscribe to Product

beanshell beanshell 1.0

beanshell beanshell 2.0

debian debian linux 7.0

debian debian linux 8.0

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.10

Vendor Advisories

Synopsis Important: Red Hat Fuse 731 security update Type/Severity Security Advisory: Important Topic A micro version update (from 73 to 731) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security ...
BeanShell could be made to run programs if it processed specially crafted input ...
Alvaro Muñoz and Christian Schneider discovered that BeanShell, an embeddable Java source interpreter, could be leveraged to execute arbitrary commands: applications including BeanShell in their classpath are vulnerable to this flaw if they deserialize data from an untrusted source For the oldstable distribution (wheezy), this problem has been fi ...
A deserialization flaw allowing remote code execution was found in the BeanShell library If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes A remote attacker could use this flaw to execute arbitrary code with the permissions o ...
Check Point Reference: CPAI-2016-1278 Date Published: 28 Feb 2024 Severity: High ...

Github Repositories

Most common theorical Web RCE's with some "testing code" and PoC's to practise with (not real CVE's)

Web-RCE-PoC-s Most common theorical Web RCE's with some exploits and PoC's to practise with (not real CVE's) PYTHON: 1Unsafe Deserialization of untrusted input data: a Pickleload(): RCE through Deserialization Using uncontrolled Pickleload Funtion 2Command Injection and Argument Injection: Dangerous Functions: #Three ways to invoke commands in Python

BeanShell 2016-02-18 Security update Note: A security vulnerability has been identified in BeanShell that could be exploited for remote code execution in applications that has BeanShell on its classpath (CVE-2016-2510) The vulnerability has been fixed in the security update BeanShell 20b6 This is a recommended update for all BeanShell users Introduction BeanShell is a sma