CVE-2013-0422 (CNNVD-201301-193)

CRITICAL 有利用代码
中文标题:
Oracle Java Runtime Environment 远程代码执行漏洞
英文标题:
Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitra...
CVSS分数: 9.8
发布时间: 2013-01-10 21:23:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Oracle Java Runtime Environment(JRE)是美国甲骨文(Oracle)公司的一个Java运行时环境,是运行Java程序所必须的环境的集合。 Oracle Java 7 Update 10及之前的版本中存在提权漏洞,该漏洞源于Oracle Java允许使用内容结合JMX (Java Management Extensions) MBean组件和sun.org.mozilla.javascript.internal对象调用‘setSecurityManager()’函数。攻击者通过使用com.sun.jmx.mbeanserver.MBeanInstantiator.findClass方法利用该漏洞检索任意数据包的Class引用。也可通过使用递归的Reflection API利用该漏洞绕过安全检查,进而执行任意代码。

英文描述:

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

CWE类型:
CWE-264 CWE-284
标签:
remote java Metasploit OSVDB-89059
受影响产品
厂商 产品 版本 版本范围 平台 CPE
oracle jdk 1.7.0 - - cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*
oracle jre 1.7.0 - - cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
canonical ubuntu_linux 12.10 - - cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
opensuse opensuse 12.2 - - cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2013:0156 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
MDVSA-2013:095 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
openSUSE-SU-2013:0199 vendor-advisory
cve.org
访问
RHSA-2013:0165 vendor-advisory
cve.org
访问
VU#625617 third-party-advisory
cve.org
访问
TA13-010A third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
USN-1693-1 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
20130110 [SE-2012-01] 'Fix' for Issue 32 exploited by new Java 0-day code mailing-list
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
ExploitDB EDB-24045 EXPLOIT
exploitdb
访问
Download Exploit EDB-24045 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2013-0422 ADVISORY
cve.org
访问
CVSS评分详情
3.1 (adp)
CRITICAL
9.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2013-01-10 21:23:00
修改时间:
2025-10-22 00:05:44
创建时间:
2025-11-11 15:33:30
更新时间:
2025-11-11 16:19:55
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2013-0422 2025-11-11 15:18:33 2025-11-11 07:33:30
NVD nvd_CVE-2013-0422 2025-11-11 14:54:13 2025-11-11 07:42:18
CNNVD cnnvd_CNNVD-201301-193 2025-11-11 15:09:19 2025-11-11 07:50:30
EXPLOITDB exploitdb_EDB-24045 2025-11-11 15:05:23 2025-11-11 08:19:55
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:19:55
references_count: 20 → 23; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 20 -> 23
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:50:30
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201301-193; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201301-193
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:18
affected_products_count: 0 → 4; references_count: 19 → 20; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 0 -> 4
  • references_count: 19 -> 20
  • data_sources: ['cve'] -> ['cve', 'nvd']