Red Hat Bugzilla – Bug 1327037
CVE-2016-3690 PooledInvokerServlet is not secured, and deserializes data
Last modified: 2016-11-08 11:06:13 EST
The HA Pooled Invoker allows unauthorised access, and deserializes any payload sent to it. This is one of the attack vectors for CVE-2015-7501. There are many new gadget chains available in the ysoserial project. For example the Beanshell library could be used to create a malicious serialized object. When deserialized by the HA Pooled Invoker servlet allows remote code execution.
Acknowledgments: Name: Dennis Reed, Red Hat
Any KCS already published on the topic: https://access.redhat.com/solutions/45530
Need to update Installation Guides with WARNING about unsecured Invokers, and linked to the KCS Solution 45530
Mitigation: The PooledInvokerServlet is no longer required and can be removed by following the details in this knowledgebase solution: https://access.redhat.com/solutions/178393
A proactive notification was sent to customer on 7th October.