CVE-2023-28500

A Java insecure deserialization vulnerability in Adobe LiveCycle ES4 version 11.0 and earlier allows unauthenticated remote attackers to gain operating system code execution by submitting specially crafted Java serialized objects to a specific URL. Adobe LiveCycle ES4 version 11.0.1 and later may be vulnerable if the application is installed with Java environment 7u21 and earlier. Exploitation of the vulnerability depends on two factors: insecure deserialization methods used in the Adobe LiveCycle application, and the use of Java environments 7u21 and earlier. The code execution is performed in the context of the account that is running the Adobe LiveCycle application. If the account is privileged, exploitation provides privileged access to the operating system. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:adobe:livecycle_es4:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:10

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** A Java insecure deserialization vulnerability in Adobe LiveCycle ES4 version 11.0 and earlier allows unauthenticated remote attackers to gain operating system code execution by submitting specially crafted Java serialized objects to a specific URL. Adobe LiveCycle ES4 version 11.0.1 and later may be vulnerable if the application is installed with Java environment 7u21 and earlier. Exploitation of the vulnerability depends on two factors: insecure deserialization methods used in the Adobe LiveCycle application, and the use of Java environments 7u21 and earlier. The code execution is performed in the context of the account that is running the Adobe LiveCycle application. If the account is privileged, exploitation provides privileged access to the operating system. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. A Java insecure deserialization vulnerability in Adobe LiveCycle ES4 version 11.0 and earlier allows unauthenticated remote attackers to gain operating system code execution by submitting specially crafted Java serialized objects to a specific URL. Adobe LiveCycle ES4 version 11.0.1 and later may be vulnerable if the application is installed with Java environment 7u21 and earlier. Exploitation of the vulnerability depends on two factors: insecure deserialization methods used in the Adobe LiveCycle application, and the use of Java environments 7u21 and earlier. The code execution is performed in the context of the account that is running the Adobe LiveCycle application. If the account is privileged, exploitation provides privileged access to the operating system. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References (MISC) https://coastalsecurity.gitbook.io/critical-vulnerability-adobe-livecycle-es4v11.0/ - Mitigation, Third Party Advisory () https://coastalsecurity.gitbook.io/critical-vulnerability-adobe-livecycle-es4v11.0/ -

14 Apr 2023, 16:19

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:livecycle_es4:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://coastalsecurity.gitbook.io/critical-vulnerability-adobe-livecycle-es4v11.0/ - (MISC) https://coastalsecurity.gitbook.io/critical-vulnerability-adobe-livecycle-es4v11.0/ - Mitigation, Third Party Advisory
First Time Adobe
Adobe livecycle Es4
CWE CWE-502

06 Apr 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-06 21:15

Updated : 2024-04-11 01:19


NVD link : CVE-2023-28500

Mitre link : CVE-2023-28500

CVE.ORG link : CVE-2023-28500


JSON object : View

Products Affected

adobe

  • livecycle_es4
CWE
CWE-502

Deserialization of Untrusted Data