Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47554

Опубликовано: 03 окт. 2024
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.

A vulnerability was found in the Apache Commons IO component in the org.apache.commons.io.input.XmlStreamReader class. Excessive CPU resource consumption can lead to a denial of service when an untrusted input is processed.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientscommons-ioFix deferred
A-MQ Clients 2commons-ioFix deferred
Cryostat 3commons-ioFix deferred
Cryostat 4commons-ioFix deferred
Red Hat AMQ Broker 7commons-ioNot affected
Red Hat build of Apache Camel 4 for Quarkus 3quarkus-cxf-bomFix deferred
Red Hat build of Apache Camel for Spring Boot 4commons-ioFix deferred
Red Hat build of Apache Camel - HawtIO 4commons-ioFix deferred
Red Hat build of Apicurio Registry 2commons-ioFix deferred
Red Hat build of Apicurio Registry 3commons-ioFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2316271apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader

EPSS

Процентиль: 44%
0.00213
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
11 месяцев назад

Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.

CVSS3: 4.3
nvd
11 месяцев назад

Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.

msrc
10 месяцев назад

Описание отсутствует

CVSS3: 4.3
debian
11 месяцев назад

Uncontrolled Resource Consumption vulnerability in Apache Commons IO. ...

suse-cvrf
11 месяцев назад

Security update for apache-commons-io

EPSS

Процентиль: 44%
0.00213
Низкий

4.3 Medium

CVSS3