CVE-2019-10185
moderate-risk
Published 2019-07-31
It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox.
Do I need to act?
~
1.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Products (4)
Affected Vendors
References (16)
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html
Third Party Advisory
http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directo...
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10185
Third Party Advisory
https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html
Mailing List
https://seclists.org/bugtraq/2019/Oct/5
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html
Third Party Advisory
http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directo...
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10185
Third Party Advisory
https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html
Mailing List
https://seclists.org/bugtraq/2019/Oct/5
44
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
5/34 · Minimal
Exposure
10/34 · Low