Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Newly-Discovered Java Vulnerability Enables Bypass of Security Sandbox

Researchers from Security Explorations, the group who pointed out that the recently released patch to address a previous vulnerability in Java was easily bypassed, said they have discovered yet another flaw.

Researchers from Security Explorations, the group who pointed out that the recently released patch to address a previous vulnerability in Java was easily bypassed, said they have discovered yet another flaw. This time however, the issue impacts Java installations as far back as version 5, which is still in use online, and all browsers.

According to a post on the Full Disclosure mailing list, Java SE 5 (update 22), Java SE 6 (update 35), and Java 7 (update 7) are all vulnerable, allowing a full system compromise if exploited. The researchers say they confirmed the issue on Firefox, Chrome, Internet Explorer, Opera, and Safari.

“We’ve recently discovered yet another security vulnerability affecting all latest versions of Oracle Java SE software,” Security Explorations’ Adam Gowdiak posted to the Full Disclosure List. “The impact of this issue is critical – we were able to successfully exploit it and achieve a complete Java security sandbox bypass in the environment of Java SE 5, 6 and 7.”

Other than announcing the discovery, no other information was provided, as they gave the details to Oracle with the hope that they would patch it in time for the October security releases.

The irony that nothing of technical value was shared on the Full Disclosure post wasn’t lost on some of the mailing list’s readers. “I don’t see any details? This list is ‘full disclosure,’ not touch self in public,” commented Chris Evans in a response to the initial post.

Meanwhile, Oracle has made no comment on the disclosure, and it’s likely that they won’t, given that they have a new issue to address on top of everything else.

“We hope that a news about one billion users of Oracle Java SE software being vulnerable to yet another security flaw is not gonna spoil the taste of Larry Ellison’s morning…Java,” the Full Disclosure post taunted.

To date, Security Explorations has disclosed 31 Java related issues to Oracle, including 17 of them that completely bypass the sandbox protections.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.