logo

CVE-2022-37023 org.apache.geode:geode-core

Package

Manager: maven
Name: org.apache.geode:geode-core
Vulnerable Version: >=0 <1.15.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00327 pctl0.54953

Details

Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.

Metadata

Created: 2022-09-01T00:00:26Z
Modified: 2022-09-16T18:48:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-72x9-48mc-phh6/GHSA-72x9-48mc-phh6.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-72x9-48mc-phh6
Finding: F096
Auto approve: 1