This is a list of recent vulnerabilities for which
exploits are available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit frameworks,
exploit databases, exploit kits and monitoring of internet activity.
ID:
CVE-2013-0422
Title: Oracle Java
SE Security Bypass Vulnerability
Vendor: Oracle
Description: Multiple vulnerabilities in Oracle Java 7
before Update 11 allow remote attackers to execute arbitrary code by (1) using
the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a
reference to a private MBeanInstantiator object, then retrieving arbitrary
Class references using the findClass method, and (2) using the Reflection API
with recursion in a way that bypasses a security check by the
java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the
inability of the sun.reflect.Reflection.getCallerClass method to skip frames
related to the new reflection API, as exploited in the wild in January 2013, as
demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than
CVE-2012-4681 and CVE-2012-3174.
NOTE:
some parties have mapped the recursive Reflection API
issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability
whose details are not public as of 20130114. CVE-2013-0422 covers both the
JMX/MBean and Reflection API issues.
NOTE: it was originally reported that Java
6 was also vulnerable, but the reporter has retracted this claim, stating that
Java 6 is not exploitable because the relevant code is called in a way that
does not bypass security checks.
NOTE: as of 20130114, a reliable third party
has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle
Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE
identifier might be created for the unfixed issue.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID:
CVE-2013-0156
Title: Ruby on
Rails XML Processor YAML Deserialization Code Execution
Vendor: rubyonrails.org
Description: active_support/core_ext/hash/conversions.rb
in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and
3.2.x before 3.2.11 does not properly restrict casts of string values, which
allows remote attackers to conduct object-injection attacks and execute
arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by
leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type
conversion.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID:
CVE-2012-5088
Title: Java
Applet Method Handle Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java
Runtime Environment
(JRE) component in Oracle Java SE 7 Update 7 and earlier
allows remote attackers to affect confidentiality, integrity, and availability
via unknown vectors related to Libraries.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID:
CVE-2012-5076
Title: Java
Applet AverageRangeStatisticImpl Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java
Runtime Environment
(JRE) component in Oracle Java SE 7 Update 7 and earlier
allows remote attackers to affect confidentiality, integrity, and availability,
related to JAX-WS.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID:
CVE-2013-0209
Title: Movable
Type 4.2x, 4.3x Web Upgrade Remote Code Execution
Vendor: movabletype.org
Description: lib/MT/Upgrade.pm in mt-upgrade.cgi in
Movable Type 4.2x and 4.3x through 4.38 does not require authentication for
requests to database-migration functions, which allows remote attackers to
conduct eval injection and SQL injection attacks via crafted parameters, as
demonstrated by an eval injection attack against the core_drop_meta_for_table
function, leading to execution of arbitrary Perl code.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
ID:
CVE-2013-0333
Title: Ruby on
Rails JSON Processor YAML Deserialization Code Execution
Vendor: rubyonrails.org
Description: A remote exploitation of an input validation
error vulnerability in versions prior to 3.0.20, 2.3.16 of Ruby on Rails. The vulnerable application fails to validate
specially crafted JSON requests that are processed by the YAML parser. This
vulnerability is very similar to CVE-2013-0156.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
No hay comentarios:
Publicar un comentario
Te agradezco tus comentarios. Te esperamos de vuelta.