Vulnerability Description
Remote Code Execution is possible in Code42 CrashPlan 5.4.x via the org.apache.commons.ssl.rmi.DateRMI Java class, because (upon instantiation) it creates an RMI server that listens on a TCP port and deserializes objects sent by TCP clients.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Code42 | Crashplan | 5.4 |
Related Weaknesses (CWE)
References
- https://blog.radicallyopensecurity.com/CVE-2017-9830.htmlThird Party Advisory
- https://blog.radicallyopensecurity.com/CVE-2017-9830.htmlThird Party Advisory
FAQ
What is CVE-2017-9830?
CVE-2017-9830 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Remote Code Execution is possible in Code42 CrashPlan 5.4.x via the org.apache.commons.ssl.rmi.DateRMI Java class, because (upon instantiation) it creates an RMI server that listens on a TCP port and ...
How severe is CVE-2017-9830?
CVE-2017-9830 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-9830?
Check the references section above for vendor advisories and patch information. Affected products include: Code42 Crashplan.