CVE-2016-2510

Published on: 04/07/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:16 PM UTC

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Beanshell from Beanshell contain the following vulnerability:

BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.

  • CVE-2016-2510 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.1 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
BeanShell CVE-2016-2510 Remote Code Execution Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 84139
BeanShell: Arbitrary code execution (GLSA 201607-17) — Gentoo security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201607-17
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:1135
404 - File or directory not found. Exploit
Third Party Advisory
www.rsaconference.com
application/pdf
Inactive LinkNot Archived
URL Logo MISC www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf
Release BeanShell 2.0b6 · beanshell/beanshell · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/beanshell/beanshell/releases/tag/2.0b6
[security-announce] openSUSE-SU-2016:0833-1: important: Security update Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0833
Red Hat JBoss Deserialization Bug in BeanShell Library Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1035440
Avoid (de)serialization of XThis.Handler · beanshell/[email protected] · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced
Oracle Critical Patch Update Advisory - October 2020 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuoct2020.html
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0539
BeanShell exploit by pwntester · Pull Request #13 · frohoff/ysoserial · GitHub Exploit
Third Party Advisory
github.com
text/html
URL Logo MISC github.com/frohoff/ysoserial/pull/13
USN-2923-1: BeanShell vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-2923-1
Debian -- Security Information -- DSA-3504-1 bsh Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3504
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0540
[security-announce] openSUSE-SU-2016:0788-1: important: Security update Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0788
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2035
Red Hat Customer Portal - Access to 24x7 support and knowledge Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:1376
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2019:1545
Prevent deserialization of Handler · beanshell/[email protected] · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationBeanshellBeanshell1.0AllAllAll
ApplicationBeanshellBeanshell2.0beta1AllAll
ApplicationBeanshellBeanshell2.0beta4AllAll
ApplicationBeanshellBeanshell2.0beta5AllAll
ApplicationBeanshellBeanshell1.0AllAllAll
ApplicationBeanshellBeanshell2.0beta1AllAll
ApplicationBeanshellBeanshell2.0beta4AllAll
ApplicationBeanshellBeanshell2.0beta5AllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux15.10AllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux15.10AllAllAll
Operating
System
DebianDebian Linux7.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux7.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
  • cpe:2.3:a:beanshell:beanshell:1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:beanshell:beanshell:2.0:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:beanshell:beanshell:2.0:beta4:*:*:*:*:*:*:
  • cpe:2.3:a:beanshell:beanshell:2.0:beta5:*:*:*:*:*:*:
  • cpe:2.3:a:beanshell:beanshell:1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:beanshell:beanshell:2.0:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:beanshell:beanshell:2.0:beta4:*:*:*:*:*:*:
  • cpe:2.3:a:beanshell:beanshell:2.0:beta5:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*: