Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-33207: advisories/2021/CVE-2021-33207 at master · blackarrowsec/advisories

The HTTP client in MashZone NextGen through 10.7 GA deserializes untrusted data when it gets an HTTP response with a 570 status code.

CVE
#vulnerability#git#java

CVE-2021-33207: Remote Code Execution (Java Deserialization)

Vendor: Software AG
Vendor URL: https://www.softwareag.com/corporate/products/az/mashzone_nextgen/default
Versions affected: MashZone NextGen 10.7 GA | Build 1607 (Vendor did not provide data about other affected versions)
Discovered by: Marcos Díaz
Public fix: No
Proof of Concept: No

Summary

MashZone NextGen 10.7 GA | Build 1607 and likely other/older versions, are affected by an insecure Java Object deserialization.

Details

The method errorResponse from the class com.idsscheer.ppmmashup.io.util.ZHttpRequestHelper performs an insecure Java deserialization from the body of a special crafted HTTP answer.

Impact

Command execution can be achieved forcing the application to make a HTTP request to a server controlled by an attacker.

Recommendation

Make sure you have changed the default administrative credentials. At this point we do not have information about a fix from Software AG.

Timeline

  • 19/05/2021 - Reported vulnerability to vendor
  • 31/08/2021 - A representative from Software AG asks for details
  • 30/03/2022 - Public Disclosure

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907