CVE-2022-37021 – org.apache.geode:geode-core
Package
Manager: maven
Name: org.apache.geode:geode-core
Vulnerable Version: >=0 <1.12.16 || >=1.13.0 <1.13.5 || >=1.14.0 <1.14.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0074 pctl0.72055
Details
Apache Geode vulnerable to Deserialization of Untrusted Data Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. If upgrading to Java 11 is not possible, then upgrade to Apache Geode 1.15 and specify "--J=-Dgeode.enableGlobalSerialFilter=true" when starting any Locators or Servers. Follow the documentation for details on specifying any user classes that may be serialized/deserialized with the "serializable-object-filter" configuration option. Using a global serial filter will impact performance.
Metadata
Created: 2022-09-01T00:00:26Z
Modified: 2023-03-10T23:21:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-q4q3-r45f-7gwg/GHSA-q4q3-r45f-7gwg.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-q4q3-r45f-7gwg
Finding: F096
Auto approve: 1