Files
CVEs-PoC/2018/CVE-2018-2657.md
T
2024-06-18 02:51:15 +02:00

19 lines
1.8 KiB
Markdown

### [CVE-2018-2657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2657)
![](https://img.shields.io/static/v1?label=Product&message=Java&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Java%20SE%3A%206u171%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE%2C%20JRockit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Java%20SE%2C%20JRockit.&color=brighgreen)
### Description
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u171 and 7u161; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
#### Github
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs