Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for apache-commons-collections (ALAS-2015-618) (CVE-2015-7501)

Back to Search

Amazon Linux AMI: Security patch for apache-commons-collections (ALAS-2015-618) (CVE-2015-7501)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
12/18/2015
Created
07/25/2018
Added
12/18/2015
Modified
12/01/2017

Description

It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

Solution(s)

  • amazon-linux-upgrade-apache-commons-collections
  • amazon-linux-upgrade-apache-commons-collections-javadoc
  • amazon-linux-upgrade-apache-commons-collections-testframework
  • amazon-linux-upgrade-apache-commons-collections-testframework-javadoc

References

  • amazon-linux-upgrade-apache-commons-collections
  • amazon-linux-upgrade-apache-commons-collections-javadoc
  • amazon-linux-upgrade-apache-commons-collections-testframework
  • amazon-linux-upgrade-apache-commons-collections-testframework-javadoc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;