CVE-2015-5236

7.5 HIGH

📋 TL;DR

CVE-2015-5236 is a Same Origin Policy bypass vulnerability in IcedTea-Web that allows malicious websites to spoof the codebase attribute in Java applet tags. This enables attackers to bypass browser security restrictions and potentially execute unauthorized actions. Users running affected versions of IcedTea-Web with Java applets enabled are vulnerable.

💻 Affected Systems

Products:
  • IcedTea-Web
Versions: Versions prior to 1.5.3 and 1.6.2
Operating Systems: Linux distributions with IcedTea-Web packages
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Java applets to be enabled in browser. Affects Red Hat Enterprise Linux, Fedora, CentOS, and other distributions using IcedTea-Web.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete bypass of Same Origin Policy allowing malicious websites to read sensitive data from other domains, perform unauthorized actions, or execute arbitrary code within the browser context.

🟠

Likely Case

Data theft or session hijacking through cross-origin requests to vulnerable applications using Java applets.

🟢

If Mitigated

Limited impact if Java applets are disabled or proper network segmentation prevents access to sensitive systems.

🌐 Internet-Facing: MEDIUM - Requires user to visit malicious website with Java applets enabled, but exploitation is straightforward.
🏢 Internal Only: LOW - Primarily affects browser-based Java applets, less relevant for internal-only applications.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit malicious website with Java applets enabled. Proof of concept demonstrated in Red Hat bug reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IcedTea-Web 1.5.3 and 1.6.2

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=1256403

Restart Required: Yes

Instructions:

1. Update IcedTea-Web package using your distribution's package manager. 2. For RHEL/CentOS: 'yum update icedtea-web'. 3. For Fedora: 'dnf update icedtea-web'. 4. Restart browser after update.

🔧 Temporary Workarounds

Disable Java applets in browser

all

Completely disable Java applet support in web browsers to prevent exploitation.

Browser-specific: Disable Java plugin in browser settings

Use NoScript or similar extensions

all

Block Java applet execution on untrusted websites using browser security extensions.

Install NoScript or uMatrix extension and configure to block Java

🧯 If You Can't Patch

  • Disable Java applets completely in all browsers
  • Implement network filtering to block access to websites requiring Java applets

🔍 How to Verify

Check if Vulnerable:

Check IcedTea-Web version: 'rpm -q icedtea-web' or 'dpkg -l | grep icedtea-web'. If version is below 1.5.3 or 1.6.2, system is vulnerable.

Check Version:

rpm -q icedtea-web  # RHEL/CentOS/Fedora
dpkg -l | grep icedtea-web  # Debian/Ubuntu

Verify Fix Applied:

Verify updated version: 'rpm -q icedtea-web' should show 1.5.3 or higher, or 1.6.2 or higher. Test Java applet functionality remains working.

📡 Detection & Monitoring

Log Indicators:

  • Java applet loading errors
  • Cross-origin requests from Java applets
  • Browser console errors about SOP violations

Network Indicators:

  • HTTP requests with spoofed Referer headers from Java applets
  • Cross-domain requests originating from applet contexts

SIEM Query:

source="browser_logs" AND (message="*Same Origin Policy*" OR message="*codebase*" OR message="*applet*")

🔗 References

📤 Share & Export