Vulnerability Description
Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumvent the execution limits. If a different script engine was used, no execution limits were in place. Both vectors allow remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Netbeans | 9.0 |
References
- http://www.securityfocus.com/bid/106352Third Party AdvisoryVDB Entry
- https://lists.apache.org/thread.html/d1c37966a316a326ab4ff4d4bc056322e8adcbe984e
- http://www.securityfocus.com/bid/106352Third Party AdvisoryVDB Entry
- https://lists.apache.org/thread.html/d1c37966a316a326ab4ff4d4bc056322e8adcbe984e
FAQ
What is CVE-2018-17191?
CVE-2018-17191 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascr...
How severe is CVE-2018-17191?
CVE-2018-17191 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-17191?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Netbeans.