CVE-2013-0422 (CNNVD-201301-193)
中文标题:
Oracle Java Runtime Environment 远程代码执行漏洞
英文标题:
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitra...
漏洞描述
中文描述:
Oracle Java Runtime Environment(JRE)是美国甲骨文(Oracle)公司的一个Java运行时环境,是运行Java程序所必须的环境的集合。 Oracle Java 7 Update 10及之前的版本中存在提权漏洞,该漏洞源于Oracle Java允许使用内容结合JMX (Java Management Extensions) MBean组件和sun.org.mozilla.javascript.internal对象调用‘setSecurityManager()’函数。攻击者通过使用com.sun.jmx.mbeanserver.MBeanInstantiator.findClass方法利用该漏洞检索任意数据包的Class引用。也可通过使用递归的Reflection API利用该漏洞绕过安全检查,进而执行任意代码。
英文描述:
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| oracle | jdk | 1.7.0 | - | - |
cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*
|
| oracle | jre | 1.7.0 | - | - |
cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 12.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
|
| opensuse | opensuse | 12.2 | - | - |
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
nvd.nist.gov
exploitdb
exploitdb
cve.org
CVSS评分详情
3.1 (adp)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2013-0422 |
2025-11-11 15:18:33 | 2025-11-11 07:33:30 |
| NVD | nvd_CVE-2013-0422 |
2025-11-11 14:54:13 | 2025-11-11 07:42:18 |
| CNNVD | cnnvd_CNNVD-201301-193 |
2025-11-11 15:09:19 | 2025-11-11 07:50:30 |
| EXPLOITDB | exploitdb_EDB-24045 |
2025-11-11 15:05:23 | 2025-11-11 08:19:55 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 20 -> 23
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201301-193
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 4
- references_count: 19 -> 20
- data_sources: ['cve'] -> ['cve', 'nvd']