Security for everyone

CVE-2017-12149 Scanner

Detects 'Code Injection' vulnerability in Red Hat jbossas affects v. Unknown.

SCAN NOW

Short Info


Level

Critical

Type

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2017-12149 Scanner Detail

Red Hat jbossas is an open-source Java EE-based application server used by businesses to host and deploy applications. It provides a platform for developers to build and deploy web applications and provides a robust runtime environment. Jbossas is widely used in medium to large-scale enterprises, particularly in the financial, health, government, and telecommunications sectors.

One of the vulnerabilities that were detected in Jbossas is known as CVE-2017-12149, which is a deserialization vulnerability that allows attackers to execute arbitrary code through crafted serialized data. The vulnerability resides in the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker, which does not restrict classes for which it performs deserialization. This vulnerability is a result of insecure deserialization practices that can be exploited by attackers to manipulate serialized data and execute malicious code on the target system.

When exploited, CVE-2017-12149 can have severe consequences for the targeted system. Attackers can use it to gain complete control over the system, steal sensitive data, or cause system crashes. This vulnerability can lead to significant business losses, reputational damage, and legal consequences.

The securityforeveryone.com platform provides pro features that enable businesses to conduct efficient and effective vulnerability assessments. With a vast database of potential vulnerabilities, businesses can easily and quickly learn about vulnerabilities that could affect their digital assets. The platform enables businesses to stay ahead of security threats and to protect their systems from cyber-attacks.

 

REFERENCES

cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture