漏洞信息详情
BeanShell 任意命令执行漏洞
漏洞简介
BeanShell(bsh)是一个开源的、免费的Java源代码解释器。
BeanShell(bsh)2.0b6之前版本中存在安全漏洞。当使用Java序列化或Xstream的应用程序将BeanShell包含在类路径中时,远程攻击者可借助特制的序列化数据利用该漏洞执行任意代码。
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
https://github.com/beanshell/beanshell/releases/tag/2.0b6
参考网址
来源:DEBIAN
链接:http://www.debian.org/security/2016/dsa-3504
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00078.html
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2016-0540.html
来源:GENTOO
链接:https://security.gentoo.org/glsa/201607-17
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2016-2035.html
来源:CONFIRM
链接:https://github.com/beanshell/beanshell/releases/tag/2.0b6
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1545
来源:UBUNTU
链接:http://www.ubuntu.com/usn/USN-2923-1
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2016:1376
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2016:1135
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00056.html
来源:DEBIAN
链接:https://www.debian.org/security/2016/dsa-3504
来源:CONFIRM
链接:https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced
来源:CONFIRM
链接:https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49
来源:BID
链接:https://www.securityfocus.com/bid/84139
来源:MISC
链接:https://github.com/frohoff/ysoserial/pull/13
来源:MISC
链接:https://www.rsaconference.com/writable/presentations/file_upload/asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2016-0539.html
来源:SECTRACK
链接:http://www.securitytracker.com/id/1035440
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:1545
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2161/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153344/Red-Hat-Security-Advisory-2019-1545-01.html
受影响实体
- Debian Debian_linux:8.0<!--2000-1-1-->
补丁
- BeanShell 任意命令执行漏洞的修复措施<!--2016-3-7-->
还没有评论,来说两句吧...