Oracle Java SE Wv8u131 Information Disclosure

Discussion in 'News Aggregator' started by Packet Storm, 3 Nov 2017.

  1. Packet Storm

    Packet Storm Guest

    Oracle Java SE installs a protocol handler in the registry as "HKEY_CLASSES_ROOT\jnlp\Shell\Open\Command\Default" 'C:\Program Files\Java\jre1.8.0_131\bin\jp2launcher.exe" -securejws "%1"'. This can allow allow an attacker to launch remote jnlp files with little user interaction. A malicious jnlp file containing a crafted XML XXE attack can be leveraged to disclose files, cause a denial of service or trigger SSRF. Versions v8u131 and below are affected.

    Continue reading...
     

Share This Page

Loading...