9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
32.6%
In Clojure before 1.9.0, classes can be used to construct a serialized
object that executes arbitrary code upon deserialization. This is relevant
if a server deserializes untrusted objects.
clojure.atlassian.net/browse/CLJ-2204
github.com/frohoff/ysoserial/pull/68/files
hackmd.io/%40fe1w0/HyefvRQKp
launchpad.net/bugs/cve/CVE-2017-20189
nvd.nist.gov/vuln/detail/CVE-2017-20189
security-tracker.debian.org/tracker/CVE-2017-20189
security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378
www.cve.org/CVERecord?id=CVE-2017-20189
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
32.6%