Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN075
_____________________________________________________________________

DATE                : 26/01/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Continuum.

=====================================================================
https://lists.apache.org/thread/hbvf1ztqw2kv51khvzm5nk3mml3nm4z1
_____________________________________________________________________

CVE-2016-15057: Apache Continuum: Command injection leading to RCE
Severity: important 

Affected versions:

- Apache Continuum (org.apache.continuum:continuum): all versions

Description:

** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special
Elements used in a Command ('Command Injection') vulnerability in
Apache Continuum.

This issue affects Apache Continuum: all versions.

Attackers with access to the installations REST API can use this to
invoke arbitrary commands on the server.

As this project is retired, we do not plan to release a version that
fixes this issue. Users are recommended to find an alternative or
restrict access to the instance to trusted users.

NOTE: This vulnerability only affects products that are no longer
supported by the maintainer.

References:

https://www.apache.org/security/
https://www.cve.org/CVERecord?id=CVE-2016-15057


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




