Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC)
interpretation is vulnerable for remote command execution (RCE). Using the
nashorn script engine the environment of the javascript execution for the
Proxy Auto-Configuration leaks privileged objects, that can be used to
circumvent the execution limits. If a different script engine was used, no
execution limits were in place. Both vectors allow remote code execution.
Upstream:released (10.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Trusty/esm:DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (10.0-3~18.04.1ubuntu1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (10.0-3~18.04.1ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (10.0-3)
Ubuntu 19.10 (Eoan):not-affected (10.0-3)
More Information

Updated: 2019-04-26 14:27:24 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)