Remote Command Execution in Apache NetBeans Proxy Auto-Configuration
CVE-2018-17191

9.8CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
31 December 2018

Summary

Apache NetBeans (incubating) version 9.0 is susceptible to a remote command execution vulnerability due to improper handling of the Proxy Auto-Configuration (PAC) interpretation. The use of the nashorn script engine enables the environment of the JavaScript execution to leak privileged objects, which can be exploited to bypass preset execution limits. Should a different script engine be utilized, the absence of execution restrictions further exacerbates the risk, allowing for remote code execution through both vectors.

Affected Version(s)

Apache NetBeans 9.0 incubating

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.