// For flags

CVE-2017-15708

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version.

En Apache Synapse, no se requiere por defecto autenticación para Java Remote Method Invocation (RMI). Por lo tanto, Apache Synapse 3.0.1 o todas las versiones anteriores (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2 y 1.1.1) permite ataques de ejecución remota de código que pueden realizarse inyectando objetos serializados especialmente manipulados. La presencia de Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) o versiones previas en la distribución Synapse lo hace explotable. Para mitigar este problema, es necesario limitar el acceso RMI solo a usuarios de confianza. La actualización a la versión 3.0.1 eliminará el riesgo de tener dicha versión de Commons Collection. En Synapse 3.0.1, Commons Collection se ha actualizado a la versión 3.2.2.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-10-21 CVE Reserved
  • 2017-12-11 CVE Published
  • 2017-12-18 First Exploit
  • 2024-08-13 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
1.0
Search vendor "Apache" for product "Synapse" and version "1.0"
-
Affected
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
1.1
Search vendor "Apache" for product "Synapse" and version "1.1"
-
Affected
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
1.1.1
Search vendor "Apache" for product "Synapse" and version "1.1.1"
-
Affected
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
1.1.2
Search vendor "Apache" for product "Synapse" and version "1.1.2"
-
Affected
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
1.2
Search vendor "Apache" for product "Synapse" and version "1.2"
-
Affected
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
2.0.0
Search vendor "Apache" for product "Synapse" and version "2.0.0"
-
Affected
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
2.1.0
Search vendor "Apache" for product "Synapse" and version "2.1.0"
-
Affected
Apache
Search vendor "Apache"
Synapse
Search vendor "Apache" for product "Synapse"
3.0.0
Search vendor "Apache" for product "Synapse" and version "3.0.0"
-
Affected
Oracle
Search vendor "Oracle"
Financial Services Market Risk Measurement And Management
Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management"
8.0.6
Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management" and version "8.0.6"
-
Affected
Oracle
Search vendor "Oracle"
Financial Services Market Risk Measurement And Management
Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management"
8.0.8
Search vendor "Oracle" for product "Financial Services Market Risk Measurement And Management" and version "8.0.8"
-
Affected
Oracle
Search vendor "Oracle"
Peoplesoft Enterprise Peopletools
Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools"
8.56
Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.56"
-
Affected
Oracle
Search vendor "Oracle"
Peoplesoft Enterprise Peopletools
Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools"
8.57
Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.57"
-
Affected