Wednesday, March 6, 2019
Home / Security / Exploits / New Java Zero-Day: fails to restrict access to privileged code

New Java Zero-Day: fails to restrict access to privileged code

A Zero-Day notice released by explains of a new Java 7 zero-day which fails to restrict access to privileged code.

The Oracle Java Runtime Environment (JRE) 1.7 allows users to run Java applications in a browser or as standalone programs. Oracle has made the JRE available for multiple operating systems.
The Java JRE plug-in provides its own Security Manager. Typically, a web applet runs with a security manager provided by the browser or Java Web Start plugin. Oracle's document states, "If there is a security manager already installed, this method first calls the security manager's checkPermission method with a RuntimePermission("setSecurityManager") permission to ensure it's safe to replace the existing security manager. This may result in throwing a SecurityException". By leveraging unspecified vulnerabilities involving Java Management Extensions (JMX) MBean components and objects, an untrusted Java applet can escalate its privileges by calling the the setSecurityManager() function to allow full privileges, without requiring code signing. Oracle Java 7 update 10 and earlier are affected.

This zero-day is already being utilized in the wild, and is described to be incorporated into exploit kits. Exploit code for this vulnerability is also publicly available.  You can find the could on Metasploit’s site.

This exploit could be used on various compromised sites and convincing a user to visit a specially crafted HTML document, a remote attacker may be able to execute arbitrary code on a vulnerable system.

To circumvent any attacks, you can now disable java running in your browser in Oracles new update.

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

Amazon hacked – hacker leaks 80,000 login credentials

A hacker going by the name 0x2Taylor has said to have breached the servers of …