Apache Commons Beanutils 1.9.2 BeanIntrospector deserialization

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $5k-$25k | 0.00 |
Summary
A vulnerability categorized as critical has been discovered in Apache Commons Beanutils 1.9.2. This issue affects the function BeanIntrospector. Executing a manipulation can lead to deserialization.
This vulnerability is handled as CVE-2019-10086. The attack can be executed remotely. There is not any exploit available.
Details
A vulnerability has been found in Apache Commons Beanutils 1.9.2 and classified as critical. This vulnerability affects the function BeanIntrospector. The manipulation with an unknown input leads to a deserialization vulnerability. The CWE definition for the vulnerability is CWE-502. The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
The weakness was released 08/20/2019 (Website). The advisory is available at mail-archives.apache.org. This vulnerability was named CVE-2019-10086 since 03/26/2019. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $5k-$25k at the moment (estimation calculated on 01/11/2026).
The vulnerability scanner Nessus provides a plugin with the ID 210560 (RHEL 8 : RHV Manager (ovirt-engine) 4.4 (RHSA-2020:3247)), which helps to determine the existence of the flaw in a target environment.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at Tenable (210560) and CERT Bund (WID-SEC-2022-0770). Entries connected to this vulnerability are available at VDB-153347, VDB-153644, VDB-158090 and VDB-158442. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Affected
- IBM DB2
- Red Hat Enterprise Linux
- IBM SPSS
- EMC Avamar
- Hitachi Ops Center
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.apache.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.3
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.3
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: DeserializationCWE: CWE-502 / CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 210560
Nessus Name: RHEL 8 : RHV Manager (ovirt-engine) 4.4 (RHSA-2020:3247)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
03/26/2019 🔍08/20/2019 🔍
08/21/2019 🔍
01/11/2026 🔍
Sources
Vendor: apache.orgAdvisory: RHSA-2019:4317
Status: Not defined
CVE: CVE-2019-10086 (🔍)
GCVE (CVE): GCVE-0-2019-10086
GCVE (VulDB): GCVE-100-140386
CERT Bund: WID-SEC-2022-0770 - IBM DB2: Mehrere Schwachstellen
See also: 🔍
Entry
Created: 08/21/2019 07:11Updated: 01/11/2026 15:18
Changes: 08/21/2019 07:11 (38), 08/01/2020 11:15 (17), 11/27/2023 10:47 (3), 11/08/2024 15:01 (16), 01/11/2026 15:18 (7)
Complete: 🔍
Cache ID: 216:19E:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.