Vulnerabilities > CVE-2020-4448 - Deserialization of Untrusted Data vulnerability in IBM products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
IBM WebSphere Application Server Network Deployment 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 181228.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Web Servers |
NASL id | WEBSPHERE_CVE-2020-4448.NASL |
description | The IBM WebSphere Application Server running on the remote host is version 7.0.0.0 through 7.0.0.45, 8.0.0.0 through 8.0.0.15, 8.5.0.x prior to 8.5.5.18, or 9.0.x prior to 9.0.5.4. It is, therefore, affected by a remote code execution vulnerability. An authenticated, remote attacker can exploit this by sending a specially crafted sequence of serialized objects to cause remote code execution on the system. |
last seen | 2020-06-13 |
modified | 2020-06-12 |
plugin id | 137398 |
published | 2020-06-12 |
reporter | This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/137398 |
title | IBM WebSphere Application Server 7.0.0.x <= 7.0.0.45 / 8.0.0.x <= 8.0.0.15 / 8.5.x < 8.5.5.18 / 9.0.x < 9.0.5.4 Remote Code Execution (CVE-2020-4448) |
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/181228
- https://exchange.xforce.ibmcloud.com/vulnerabilities/181228
- https://www.ibm.com/support/pages/node/6220336
- https://www.ibm.com/support/pages/node/6220336
- https://www.zerodayinitiative.com/advisories/ZDI-20-688/
- https://www.zerodayinitiative.com/advisories/ZDI-20-688/