7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
74.2%
Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC)
interpretation is vulnerable for remote command execution (RCE). Using the
nashorn script engine the environment of the javascript execution for the
Proxy Auto-Configuration leaks privileged objects, that can be used to
circumvent the execution limits. If a different script engine was used, no
execution limits were in place. Both vectors allow remote code execution.
launchpad.net/bugs/cve/CVE-2018-17191
lists.apache.org/thread.html/d1c37966a316a326ab4ff4d4bc056322e8adcbe984e8145c0ecda7fa@%3Cdev.netbeans.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2018-17191
security-tracker.debian.org/tracker/CVE-2018-17191
www.cve.org/CVERecord?id=CVE-2018-17191
www.openwall.com/lists/oss-security/2018/12/30/1
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
74.2%