CVE-2016-3737

Published on: 08/02/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:03 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Jboss Operations Network from Redhat contain the following vulnerability:

The server in Red Hat JBoss Operations Network (JON) before 3.3.6 allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization.

  • CVE-2016-3737 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 9 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL COMPLETE

CVE References

Description Tags Link
JBoss Operations Network Deserialization Bug Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036507
[R2] Red Hat JBoss Operations Network /jboss-remoting-servlet-invoker/ServerInvokerServlet Jython Deserialization Remote Code Execution - Research Advisory | Tenable® www.tenable.com
text/html
URL Logo MISC www.tenable.com/security/research/tra-2016-22
Bug 1333618 – CVE-2016-3737 JON: The agent/server communication deserializes data, and does not require authentication Issue Tracking
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1333618
Red Hat Customer Portal Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1519

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationRedhatJboss Operations NetworkAllAllAllAll
  • cpe:2.3:a:redhat:jboss_operations_network:*:*:*:*:*:*:*:*: