Loading HuntDB...

Java Deserialization RCE via JBoss on card.starbucks.in

Critical
S
Starbucks
Submitted None

Team Summary

Official summary from Starbucks

The researcher discovered that a Starbucks online system running on the domain `http://card.starbucks.in/` performs deserialization of java objects that are submitted by users on a specific path belonging to JBOSSMQ without sanitizing/validating the data. As a result, an attacker can inject a malicious java object capable of running a command on the system during the deserialization process. We have immediately taken necassary mesures to patch this vulnerability and the researcher responsibly disclosed it to RedHat as well. This was assigned [CVE-2017-7504](https://access.redhat.com/security/cve/cve-2017-7504)

Reported by joaomatosf

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Code Injection