CVE-2017-15708
Summary
| CVE | CVE-2017-15708 |
|---|---|
| State | PUBLISHED |
| Assigner | apache |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-12-11 15:29:00 UTC |
| Updated | 2025-04-20 01:37:25 UTC |
| Description | In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version. |
Risk And Classification
Primary CVSS: v3.1 9.8 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-74 | Remote Code Execution Vulnerability
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Synapse | 1.0 | All | All | All |
| Application | Apache | Synapse | 1.1 | All | All | All |
| Application | Apache | Synapse | 1.1.1 | All | All | All |
| Application | Apache | Synapse | 1.1.2 | All | All | All |
| Application | Apache | Synapse | 1.2 | All | All | All |
| Application | Apache | Synapse | 2.0.0 | All | All | All |
| Application | Apache | Synapse | 2.1.0 | All | All | All |
| Application | Apache | Synapse | 3.0.0 | All | All | All |
| Application | Oracle | Financial Services Market Risk Measurement And Management | 8.0.6 | All | All | All |
| Application | Oracle | Financial Services Market Risk Measurement And Management | 8.0.8 | All | All | All |
| Application | Oracle | Peoplesoft Enterprise Peopletools | 8.56 | All | All | All |
| Application | Oracle | Peoplesoft Enterprise Peopletools | 8.57 | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Apache Software Foundation | Apache Synapse | affected 3.0.0 | Not specified |
| CNA | Apache Software Foundation | Apache Synapse | affected 2.1.0 | Not specified |
| CNA | Apache Software Foundation | Apache Synapse | affected 2.0.0 | Not specified |
| CNA | Apache Software Foundation | Apache Synapse | affected 1.2 | Not specified |
| CNA | Apache Software Foundation | Apache Synapse | affected 1.1.2 | Not specified |
| CNA | Apache Software Foundation | Apache Synapse | affected 1.1.1 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pony Mail! | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| Apache Commons Collections: Remote code execution (GLSA 202107-37) — Gentoo security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| lists.apache.org/thread.html/r0fb289cd38c915b9a13a3376134f96222dd9100f1ef66b41... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| Multiple Apache Products CVE-2017-15708 Remote Code Execution Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Oracle Critical Patch Update Advisory - January 2020 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Oracle Critical Patch Update Advisory - July 2020 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.