Bug 2212999 (CVE-2023-31890)

Summary: CVE-2023-31890 glazedlists: XML Deserialization permits code execution via BeanXMLByteCoder parameter
Product: [Other] Security Response Reporter: Chess Hazlett <chazlett>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: adupliak, alampare, alazarot, chazlett, dhanak, emingora, gjospin, ibek, jrokos, kverlaen, lbacciot, lpetrovi, mnovotny, pjindal, rguimara, rrajasek, rsynek, saroy
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in glazedlists, which permits code execution when deserializing code via the BeanXMLByteDecoder's decode method. This flaw allows an attacker to execute code on the vulnerable system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-06-07 04:17:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2207774    

Description Chess Hazlett 2023-06-06 20:15:05 UTC
An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter.

Comment 1 Product Security DevOps Team 2023-06-07 04:17:46 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-31890