CVE-2017-1000486
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Description
Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
Analysis
Primetek PrimeFaces 5.x uses weak encryption for ViewState parameters, allowing unauthenticated remote code execution through crafted serialized Java objects sent via the ViewState mechanism.
Technical Context
The CWE-326 weak encryption flaw means PrimeFaces uses a static or easily derivable encryption key to protect serialized ViewState data. Attackers can brute-force or derive the key, decrypt the ViewState, inject a malicious Java deserialization payload (e.g., Commons Collections gadget chain), re-encrypt it, and send it to the server.
Affected Products
['Primetek PrimeFaces 5.x']
Remediation
Upgrade PrimeFaces to 5.2.21+, 5.3.8+, or 6.0+. Configure a strong, random encryption key. Implement Java serialization filters to restrict deserializable classes.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today