Security Bulletin: WebSphere Application Server Community Edition RMI classloader exposure

Flash (Alert)


A problem in the RMI classloader may enable an attacker to send a serializated object via JMX that could compromise the system.


Vulnerability Details
A specially crafted serialized object sent via the JMX connector could compromise the system due to a misconfigured RMI classloader.

CVEID : CVE-2013-1777
CVSS Base Score : 10
CVSS Temporal Score : See for the current score
CVSS Environmental Score *: Undefined
CVSS Vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Affected Products And Versions
WebSphere Application Server Community Edition

Upgrade WebSphere Application Server Community Edition server to version
Or follow the instruction bellow to fix this issue in WebSphere Application Server Community Edition

1. Download the patch

2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation.

3. Start the server with the cache cleaned, for example,

<WAS_CE_HOME>\bin\startup -c

<WAS_CE_HOME>/bin/ -c

To prevent remote exploits hide the naming(1099) and JMX(9999) ports behind a firewall or bind them to a local network interface.


Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY

Document information

More support for:

WebSphere Application Server Community Edition

Software version:

Operating system(s):

AIX, Linux, Solaris, Windows

Software edition:

Elite, Enhanced, Entry

Reference #:


Modified date:


Translate my page

Content navigation