漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Insecure Java Deserialization in Apache Karaf
Vulnerability Description
Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks, the implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes that are available within the targets class path. Generally speaking, deserialization of untrusted data does always represent a high security risk and should be prevented. The risk is low as, by default, Karaf uses a limited set of classes in the JMX server class path. It depends of system scoped classes (e.g. jar in the lib folder).
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Apache Karaf 代码问题漏洞
Vulnerability Description
Apache Karaf是美国阿帕奇(Apache)基金会的一款用于部署应用程序和组件的轻量级的OSGi(Java动态化模块化系统)容器。 Apache Karaf 存在代码问题漏洞,该漏洞源于在处理序列化数据时输入验证不安全,远程攻击者可利用该漏洞可以将专门制作的数据传递给应用程序,并在目标系统上执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A