Oracle Java JMX Remote Code Execution Exploit

The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2013-0422
Product Version: 
2013 R1
Released Date: 
Friday, January 11, 2013 - 00:00