CVE-2016-3690

Published on: 06/08/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Jboss Enterprise Application Platform from Redhat contain the following vulnerability:

The PooledInvokerServlet in JBoss EAP 4.x and 5.x allows remote attackers to execute arbitrary code via a crafted serialized payload.

  • CVE-2016-3690 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
RedHat JBoss Enterprise Application Platform CVE-2016-3690 Remote Code Execution Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 99079
How to restrict jmx invoker to localhost in JBoss EAP? - Red Hat Customer Portal Mitigation
Vendor Advisory
access.redhat.com
text/html
URL Logo MISC access.redhat.com/solutions/45530
1327037 – (CVE-2016-3690) CVE-2016-3690 PooledInvokerServlet is not secured, and deserializes data Issue Tracking
Vendor Advisory
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1327037
How to disable the Pooled Invoker in JBoss EAP 4.x/5.x - Red Hat Customer Portal Mitigation
Vendor Advisory
access.redhat.com
text/html
URL Logo CONFIRM access.redhat.com/solutions/178393

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationRedhatJboss Enterprise Application Platform4.2.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform4.3.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.0.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.1.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.1.1AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.1.2AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.2.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform4.2.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform4.3.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.0.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.1.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.1.1AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.1.2AllAllAll
ApplicationRedhatJboss Enterprise Application Platform5.2.0AllAllAll
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*: