CVE-2022-21549 Oracle Java SE, Oracle GraalVM Enterprise Edition is affected by a vulnerability in the Libraries component. The vulnerability could allow a remote attacker to obtain system privileges.

CVE-2022-21549 Oracle Java SE, Oracle GraalVM Enterprise Edition is affected by a vulnerability in the Libraries component. The vulnerability could allow a remote attacker to obtain system privileges.

by using the sendMessage API with a crafted object. The attacker cannot inject malicious code using the Java language, but can instead use scripting languages such as JavaScript or Python. When Graal runs untrusted code, Graal cannot ensure that the code has not been altered or compromised by a remote attacker. If an attacker can inject malicious code, it can exploit this vulnerability. Note: This vulnerability applies to Oracle Java SE and not to Oracle's implementation of Java. Java is a trademark of Oracle. Graal is a trademark of Oracle. The issue can be exploited by an unauthenticated attacker via multiple ways such as By convincing users to visit an attacker controlled website that hosts a web application that hosts an untrusted code. By sending web application users a link that hosts an attacker controlled website that hosts a web application that hosts an untrusted code. By sending a link via email or instant message that hosts an attacker controlled website that hosts a web application that hosts an untrusted code. By convincing users to visit an attacker controlled website that hosts an untrusted Java web application that hosts an untrusted code. By convincing users to visit an attacker controlled website that hosts a web application that hosts an untrusted Java web application that hosts an untrusted code. The issue can be exploited by an unauthenticated attacker via multiple ways such as

Vulnerability Summary

The Java Runtime Environment (JRE) contains a vulnerability that can be exploited by an unauthenticated attacker. This vulnerability can be exploited by convincing users to visit an attacker controlled website that hosts a web application that hosts an untrusted code. The issue can be exploited by the following methods:
1. By convincing users to visit an attacker controlled website that hosts a web application that hosts an untrusted code.
2. By convincing users to visit an attacker controlled website that hosts a web application that hosts an untrusted Java web application that hosts an untrusted code.
3. By convincing users to visit an attacker controlled website that hosts a web application that hosts an untrusted Java web application that hosts an unauthenticated user's script code with privileges of the user running the script, without going through any authentication checks, and without checking access control lists on files read by the execution of this code.
4. By sending a link via email or instant message that hosts an attacker controlled website
that hosts a web application
that has been configured to run with its privileges set to the privileges of the current user, without going through any authentication checks, and without checking access control lists on files read by the execution of this code in order for it to load and execute successfully on behalf of the current user, but allows other scripts in this same webpage or applet file to execute as well with elevated privileges if they are able to load in parallel with this target

Vulnerability Scenario

An unauthenticated attacker who exploits the vulnerability can gain access to sensitive information.
The attacker can use the vulnerability to install malware on a vulnerable machine.

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe