CVE-2016-5229
high-risk
Published 2016-08-02
Atlassian Bamboo before 5.11.4.1 and 5.12.x before 5.12.3.1 does not properly restrict permitted deserialized classes, which allows remote attackers to execute arbitrary code via vectors related to XStream Serialization.
Do I need to act?
~
6.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (10)
Third Party Advisory
http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html
Third Party Advisory
http://www.securityfocus.com/bid/92057
Issue Tracking
https://jira.atlassian.com/browse/BAM-17736
Third Party Advisory
http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html
Third Party Advisory
http://www.securityfocus.com/bid/92057
Issue Tracking
https://jira.atlassian.com/browse/BAM-17736
51
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
9/34 · Low
Exposure
10/34 · Low