9
CVSSv2

CVE-2016-6330

Published: 27/09/2016 Updated: 07/11/2023
CVSS v2 Base Score: 9 | Impact Score: 8.5 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 801
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C

Vulnerability Summary

The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote malicious users to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3737.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat jboss operations network 3.0

redhat jboss operations network 3.3.4

redhat jboss operations network 3.3.5

redhat jboss operations network 3.1

redhat jboss operations network 3.3.2

redhat jboss operations network 3.2.0

redhat jboss operations network 3.2.2

redhat jboss operations network 3.0.1

redhat jboss operations network 3.2.3

redhat jboss operations network 3.1.2

redhat jboss operations network 3.3.1

redhat jboss operations network 3.2.1

redhat jboss operations network 3.1.1

redhat jboss operations network 3.3.6

redhat jboss operations network 3.1.4

redhat jboss operations network 3.3.3

Vendor Advisories

The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3737 ...