Attacker Value
Very High
(2 users assessed)
Exploitability
Very High
(2 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2015-7501

Disclosure Date: November 09, 2017
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Add Assessment

2
Ratings
  • Attacker Value
    High
  • Exploitability
    Very High
Technical Analysis

Several Red Hat JBoss products (JBoss Middleware Suite) widely used in enterprise environments were found to be vulnerable to a Java object serialization flaw. Exploit code is publicly available and PoC exploits are easy to develop, which allow attackers to execute arbitrary code on the affected servers with the permissions of the JBoss application.
The vulnerability resides in Apache Commons Collections library which allows deserialization of untrusted user input in JBoss and many other software products (for more information: https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/),

2
Ratings
Technical Analysis

This de-serialization exploit can be performed without authentication in many instances. Because it leads to a reverse shell, this is incredibly valuable to an attacker.

There are many tools that will perform this exploit but my favorite is: https://github.com/joaomatosf/jexboss

Due to many legacy applications being internet facing with these vulnerabilities still present, this is an extremely valuable tool for an attacker to have in their arsenal.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • redhat

Products

  • data grid 6.0.0,
  • jboss a-mq 6.0.0,
  • jboss bpm suite 6.0.0,
  • jboss data virtualization 5.0.0,
  • jboss data virtualization 6.0.0,
  • jboss enterprise application platform 4.3.0,
  • jboss enterprise application platform 5.0.0,
  • jboss enterprise application platform 6.0.0,
  • jboss enterprise brms platform 5.0.0,
  • jboss enterprise brms platform 6.0.0,
  • jboss enterprise soa platform 5.0.0,
  • jboss enterprise web server 3.0.0,
  • jboss fuse 6.0.0,
  • jboss fuse service works 6.0,
  • jboss operations network 3.0,
  • jboss portal 6.0.0,
  • openshift 3.0,
  • subscription asset manager 1.3.0,
  • xpaas 3.0.0

References

Additional Info

Technical Analysis