Remote Command Execution in Apache NetBeans Proxy Auto-Configuration
CVE-2018-17191
9.8CRITICAL
Summary
Apache NetBeans (incubating) version 9.0 is susceptible to a remote command execution vulnerability due to improper handling of the Proxy Auto-Configuration (PAC) interpretation. The use of the nashorn script engine enables the environment of the JavaScript execution to leak privileged objects, which can be exploited to bypass preset execution limits. Should a different script engine be utilized, the absence of execution restrictions further exacerbates the risk, allowing for remote code execution through both vectors.
Affected Version(s)
Apache NetBeans 9.0 incubating
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved