Vulnerabilities > CVE-2019-4279 - Deserialization of Untrusted Data vulnerability in IBM Websphere Application Server
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 160445.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Metasploit
description | This module exploits untrusted serialized data processed by the WAS DMGR Server and Cells. NOTE: There is a required 2 minute timeout between attempts as the neighbor being added must be reset. |
id | MSF:EXPLOIT/WINDOWS/IBM/IBM_WAS_DMGR_JAVA_DESERIALIZATION_RCE |
last seen | 2020-06-14 |
modified | 2019-06-11 |
published | 2019-05-16 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/ibm/ibm_was_dmgr_java_deserialization_rce.rb |
title | IBM Websphere Application Server Network Deployment Untrusted Data Deserialization Remote Code Execution |
Nessus
NASL family | Web Servers |
NASL id | WEBSPHERE_CVE-2019-4279.NASL |
description | The IBM WebSphere Application Server running on the remote host is version 7.0.x, 8.5.0.0 through 8.5.5.15, or 9.0.0.x through 9.0.0.11. It is, therefore, potentially affected by an unspecified remote code execution vulnerability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 125630 |
published | 2019-05-31 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/125630 |
title | IBM WebSphere Application Server Virtual Enterprise 7.0.x / Network Deployment 8.5.x < 8.5.5.16 / Network Deployment 9.0.0.x <= 9.0.0.11 Remote Code Execution Vulnerability (CVE-2019-4279) |
code |
|