Vulnerability Details : CVE-2012-4681
Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
Vulnerability category: Execute code
At least one public exploit which can be used to exploit this vulnerability exists!
Threat overview for CVE-2012-4681
Top countries where our scanners detected CVE-2012-4681
Top open port discovered on systems with this issue
80
IPs affected by CVE-2012-4681 1,565
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-4681!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
CVE-2012-4681
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
The Java Runtime Environment (JRE) component in Oracle Java SE allow for remote code execution.
Added on
2022-03-03
Action due date
2022-03-24
Exploit prediction scoring system (EPSS) score for CVE-2012-4681
Probability of exploitation activity in the next 30 days: 97.52%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2012-4681
-
Java 7 Applet Remote Code Execution
Disclosure Date: 2012-08-26First seen: 2020-04-26exploit/multi/browser/java_jre17_execThe exploit takes advantage of two issues in JDK 7: The ClassFinder and MethodFinder.findMethod(). Both were newly introduced in JDK 7. ClassFinder is a replacement for classForName back in JDK 6. It allows untrusted code to obtain a reference and have access to a
CVSS scores for CVE-2012-4681
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
nvd@nist.gov |
References for CVE-2012-4681
-
http://www.us-cert.gov/cas/techalerts/TA12-240A.html
Oracle Java 7 Security Manager Bypass Vulnerability | CISAThird Party Advisory;US Government Resource
-
http://marc.info/?l=bugtraq&m=135109152819176&w=2
'[security bulletin] HPSBUX02824 SSRT100970 rev.1 - HP-UX Running Java, Remote Execution of Arbitrary' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html
[security-announce] SUSE-SU-2012:1231-1: important: Security update forBroken Link
-
http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html
FireEye Blog - Threat Research and Analysis | FireEyeThird Party Advisory
-
http://www.securityfocus.com/bid/55213
Oracle Java Runtime Environment Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html
[security-announce] SUSE-SU-2012:1398-1: important: Security update forBroken Link
-
http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html
DeepEnd Research: CVE-2012-4681 Java 7 0-Day vulnerability analysisThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2012-1225.html
RHSA-2012:1225 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html
Alert for CVE-2012-4681Vendor Advisory
-
http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/
403 ForbiddenBroken Link;Exploit
-
http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html
Immunity Products: Java 0day analysis (CVE-2012-4681)Exploit;Third Party Advisory
-
https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day
Let's start the week with a new Java 0-day in MetasploitThird Party Advisory
Products affected by CVE-2012-4681
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*