Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.servicemix.bundles/org.apache.servicemix.bundles.collections-generic
  4. ›
  5. CVE-2015-6420

CVE-2015-6420: Deserialization of Untrusted Data

June 15, 2020 (updated June 12, 2023)

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

References

  • tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization
  • www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
  • www.securityfocus.com/bid/78872
  • arxiv.org/pdf/2306.05534
  • github.com/advisories/GHSA-6hgm-866r-3cjv
  • h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
  • h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
  • lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
  • nvd.nist.gov/vuln/detail/CVE-2015-6420
  • www.kb.cert.org/vuls/id/581311
  • www.tenable.com/security/research/tra-2017-14
  • www.tenable.com/security/research/tra-2017-23

Code Behaviors & Features

Detect and mitigate CVE-2015-6420 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 4.01

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

maven/org.apache.servicemix.bundles/org.apache.servicemix.bundles.collections-generic/CVE-2015-6420.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:27 +0000.