Apache Jackrabbit RMI access can lead to RCE
CVE-2023-37895
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 25 July 2023
Summary
A Java object deserialization flaw exists in the Jackrabbit webapp/standalone, enabling attackers to remotely execute code via RMI using the vulnerable 'commons-beanutils' component. This threat affects versions up to 2.20.10 (stable) and 2.21.17 (unstable). Users are strongly advised to update to safer releases: 2.20.11 or 2.21.18. Additionally, deploying other components alongside Jackrabbit may expose servers to similar vulnerabilities. For enhanced security, RMI access should be disabled to mitigate these risks.
Affected Version(s)
Apache Jackrabbit Standalone (jackrabbit-standalone and jackrabbit-standalone-components) 2.21.0 < 2.21.18
Apache Jackrabbit Standalone (jackrabbit-standalone and jackrabbit-standalone-components) 1.0.0 < 2.20.11
Apache Jackrabbit Webapp (jackrabbit-webapp) 2.21.0 < 2.21.18
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved