Skip to content

Drools Improper Input Validation vulnerability allows remote attackers to execute arbitrary code in JBoss EAP

High severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Feb 2, 2023

Package

maven org.drools:drools-core (Maven)

Affected versions

< 4.0.7

Patched versions

4.0.7

Description

The serialization implementation in JBoss Drools in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 before 4.3.0.CP09 and JBoss Enterprise SOA Platform 4.2 and 4.3 supports the embedding of class files, which allows remote attackers to execute arbitrary code via a crafted static initializer.

The maintainers of JBoss EAP patched the vulnerability by applying a fix from Drools 4.0.7.

References

Published by the National Vulnerability Database Dec 30, 2010
Published to the GitHub Advisory Database May 17, 2022
Reviewed Nov 22, 2022
Last updated Feb 2, 2023

Severity

High

EPSS score

10.423%
(95th percentile)

Weaknesses

CVE ID

CVE-2010-3708

GHSA ID

GHSA-qvq6-cw53-rmwg

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.