Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1295

Опубликовано: 02 апр. 2018
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7camelAffected
Red Hat JBoss Fuse 6camelAffected
Red Hat JBoss Fuse Integration Service 2ignite-coreAffected
Red Hat Fuse Intergration Services 2.0 based on Fuse 6.3 R7ignite-coreFixedRHSA-2018:240514.08.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1563133ignite: Possible Execution of Arbitrary Code Within Deserialization Endpoints

EPSS

Процентиль: 90%
0.05578
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 8 лет назад

In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer.

CVSS3: 9.8
github
больше 7 лет назад

Apache serialization mechanism does not have a list of classes allowed for serialization/deserialization

EPSS

Процентиль: 90%
0.05578
Низкий

8.1 High

CVSS3