CVE-2017-15708
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version.
En Apache Synapse, no se requiere por defecto autenticación para Java Remote Method Invocation (RMI). Por lo tanto, Apache Synapse 3.0.1 o todas las versiones anteriores (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2 y 1.1.1) permite ataques de ejecución remota de código que pueden realizarse inyectando objetos serializados especialmente manipulados. La presencia de Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) o versiones previas en la distribución Synapse lo hace explotable. Para mitigar este problema, es necesario limitar el acceso RMI solo a usuarios de confianza. La actualización a la versión 3.0.1 eliminará el riesgo de tener dicha versión de Commons Collection. En Synapse 3.0.1, Commons Collection se ha actualizado a la versión 3.2.2.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-10-21 CVE Reserved
- 2017-12-11 CVE Published
- 2017-12-18 First Exploit
- 2024-08-13 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/102154 | Third Party Advisory | |
https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9%40%3Cdev.synapse.apache.org%3E | Mailing List | |
https://lists.apache.org/thread.html/r0fb289cd38c915b9a13a3376134f96222dd9100f1ef66b41631865c6%40%3Ccommits.doris.apache.org%3E | Mailing List | |
https://www.oracle.com/security-alerts/cpujan2020.html | Third Party Advisory | |
https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/HuSoul/CVE-2017-15708 | 2017-12-18 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202107-37 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 1.0 Search vendor "Apache" for product "Synapse" and version "1.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 1.1 Search vendor "Apache" for product "Synapse" and version "1.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 1.1.1 Search vendor "Apache" for product "Synapse" and version "1.1.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 1.1.2 Search vendor "Apache" for product "Synapse" and version "1.1.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 1.2 Search vendor "Apache" for product "Synapse" and version "1.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 2.0.0 Search vendor "Apache" for product "Synapse" and version "2.0.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 2.1.0 Search vendor "Apache" for product "Synapse" and version "2.1.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Synapse Search vendor "Apache" for product "Synapse" | 3.0.0 Search vendor "Apache" for product "Synapse" and version "3.0.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Financial Services Market Risk Measurement And Management Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management" | 8.0.6 Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management" and version "8.0.6" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Financial Services Market Risk Measurement And Management Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management" | 8.0.8 Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management" and version "8.0.8" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.56 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.56" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.57 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.57" | - |
Affected
|