CVE Vulnerabilities

CVE-2016-2510

Published: Apr 07, 2016 | Modified: Apr 12, 2025
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
6.8 IMPORTANT
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V3
7.4 IMPORTANT
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.

Affected Software

NameVendorStart VersionEnd Version
BeanshellBeanshell1.0 (including)1.0 (including)
BeanshellBeanshell2.0-beta1 (including)2.0-beta1 (including)
BeanshellBeanshell2.0-beta4 (including)2.0-beta4 (including)
BeanshellBeanshell2.0-beta5 (including)2.0-beta5 (including)
Red Hat Fuse 7.3.1RedHatcamel*
Red Hat JBoss BPMS 6.2RedHat*
Red Hat JBoss BRMS 6.2RedHat*
Red Hat JBoss Data Virtualization 6.2RedHatbsh2*
Red Hat JBoss Fuse 6.3RedHat*
Red Hat JBoss SOA Platform 5.3RedHatjbossas*
BshUbuntudevel*
BshUbuntuesm-infra-legacy/trusty*
BshUbuntuprecise*
BshUbuntutrusty*
BshUbuntutrusty/esm*
BshUbuntuupstream*
BshUbuntuwily*

References