Vulnerabilidad en Dozer (CVE-2014-9515)
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-502
Deserialización de datos no confiables
Fecha de publicación:
29/12/2017
Última modificación:
20/04/2025
Descripción
Dozer emplea incorrectamente un enfoque basado en la reflexión, lo que podría permitir que atacantes remotos ejecuten código arbitrario mediante un objeto serializado manipulado.
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:dozer_project:dozer:*:*:*:*:*:*:*:* | 5.5.1 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://www.securityfocus.com/bid/107970
- https://github.com/DozerMapper/dozer/issues/217
- https://github.com/DozerMapper/dozer/issues/410
- https://github.com/DozerMapper/dozer/issues/786
- https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c
- https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rce
- https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdf
- https://security.netapp.com/advisory/ntap-20240719-0002/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- http://www.securityfocus.com/bid/107970
- https://github.com/DozerMapper/dozer/issues/217
- https://github.com/DozerMapper/dozer/issues/410
- https://github.com/DozerMapper/dozer/issues/786
- https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c
- https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rce
- https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdf
- https://security.netapp.com/advisory/ntap-20240719-0002/
- https://www.oracle.com/security-alerts/cpuApr2021.html