Red Hat JBoss Operations Network Java Object Deserialization RCE

critical Nessus Plugin ID 91487


The remote JBoss Operations Network server is affected by a remote code execution vulnerability


The remote Red Hat JBoss Operations Network server is affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Jython library. An unauthenticated, remote attacker can exploit this, by sending specially crafted Java objects to the HTTP interface, to execute arbitrary code on the target host.


Red Hat has released JBoss Operations Network 3.3 Update 06 to address this issue; however, Tenable Research has confirmed that the update did not resolve the issue. To mitigate this issue, users should enable agent authentication.

See Also

Plugin Details

Severity: Critical

ID: 91487

File Name: jboss_on_deserialize_cc.nasl

Version: 1.11

Type: remote

Family: Misc.

Published: 6/6/2016

Updated: 11/19/2019

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

CVSS Score Source: CVE-2016-3737


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:redhat:jboss_operations_network

Required KB Items: installed_sw/JBoss Operations Network

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 6/24/2016

Vulnerability Publication Date: 5/2/2016

Reference Information

CVE: CVE-2016-3737

BID: 90430