9.8

CVE-2018-8013

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheBatik Version >= 1.0 < 1.10
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
CanonicalUbuntu Linux Version14.04 SwEditionlts
OracleBusiness Intelligence Version11.1.1.7.0 SwEditionenterprise
OracleBusiness Intelligence Version11.1.1.9.0 SwEditionenterprise
OracleBusiness Intelligence Version12.2.1.3.0 SwEditionenterprise
OracleBusiness Intelligence Version12.2.1.4.0 SwEditionenterprise
OracleData Integrator Version12.2.1.3.0
OracleEnterprise Repository Version11.1.1.7.0
OracleEnterprise Repository Version12.1.3.0.0
OracleFusion Middleware Mapviewer Version12.2.1.2
OracleFusion Middleware Mapviewer Version12.2.1.3
OracleRetail Back Office Version13.3
OracleRetail Back Office Version13.4
OracleRetail Back Office Version14
OracleRetail Back Office Version14.1
OracleRetail Central Office Version14.1
OracleRetail Integration Bus Version17.0
OracleRetail Order Broker Version5.1
OracleRetail Order Broker Version5.2
OracleRetail Order Broker Version15.0
OracleRetail Order Broker Version16.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.33% 0.792
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

http://www.securityfocus.com/bid/104252
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040995
Third Party Advisory
VDB Entry
https://usn.ubuntu.com/3661-1/
Third Party Advisory