The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
http://www.zerodayinitiative.com/advisories/ZDI-15-638
http://www.securityfocus.com/bid/79204
http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html
http://www.securityfocus.com/archive/1/537806/100/0/threaded
http://tomee.apache.org/security/tomee.html
http://tomee-openejb.979440.n4.nabble.com/Document-resolved-vulnerability-CVE-2015-8581-td4678073.html
Source: Mitre, NVD
Published: 2017-04-11
Updated: 2025-04-20
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.09007