BeanShell is vulnerable to the remote execution of arbitrary code via Java serialization or XStream from an untrusted source.
Package | dev-java/bsh on all architectures |
---|---|
Affected versions | < 2.0_beta6 |
Unaffected versions | >= 2.0_beta6 |
BeanShell is a small, free, embeddable Java source interpreter with object scripting language features, written in Java.
An application that includes BeanShell on the classpath may be vulnerable if another part of the application uses Java serialization or XStream to deserialize data from an untrusted source.
Remote attackers could execute arbitrary code including shell commands.
There is no known workaround at this time.
All BeanShell users should upgrade to the latest version:
# emerge --sync # emerge --ask --verbose --oneshot ">=dev-java/bsh-2.0_beta6"
Release date
July 30, 2016
Latest revision
July 30, 2016: 1
Severity
normal
Exploitable
remote
Bugzilla entries