Show filters
3 Total Results
Displaying 1-3 of 3
Sort by:
Attacker Value
Unknown
The implementation of Action Message Format (AMF3) deserializers in GraniteDS, …
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
The Java implementation of AMF3 deserializers used in GraniteDS, version 3.1.1.G, may allow instantiation of arbitrary classes via their public parameter-less constructor and subsequently call arbitrary Java Beans setter methods. The ability to exploit this vulnerability depends on the availability of classes in the class path that make use of deserialization. A remote attacker with the ability to spoof or control information may be able to send serialized Java objects with pre-set properties that result in arbitrary code execution when deserialized.
0
Attacker Value
Unknown
GraniteDS, version 3.1.1.GA, Action Message Format (AMF3) Java implementation i…
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
The Java implementation of GraniteDS, version 3.1.1.GA, AMF3 deserializers derives class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialized Java objects that execute arbitrary code when deserialized.
0
Attacker Value
Unknown
CVE-2016-2340
Disclosure Date: March 25, 2016 (last updated November 25, 2024)
The AMF framework in Granite Data Services 3.1.1-SNAPSHOT allows remote authenticated users to read arbitrary files, send TCP requests to intranet servers, or cause a denial of service via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
0