Логотип exploitDog
bind:CVE-2024-52577
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-52577

Количество 4

Количество 4

redhat логотип

CVE-2024-52577

11 месяцев назад

In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2024-52577

11 месяцев назад

In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.

CVSS3: 9
EPSS: Низкий
github логотип

GHSA-8355-xj3p-hv6q

11 месяцев назад

Apache Ignite: Possible RCE when deserializing incoming messages by the server node

CVSS3: 9
EPSS: Низкий
fstec логотип

BDU:2025-04005

11 месяцев назад

Уязвимость распределённой база данных для высокопроизводительных вычислений Apache Ignite, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-52577

In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.

CVSS3: 9.8
2%
Низкий
11 месяцев назад
nvd логотип
CVE-2024-52577

In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.

CVSS3: 9
2%
Низкий
11 месяцев назад
github логотип
GHSA-8355-xj3p-hv6q

Apache Ignite: Possible RCE when deserializing incoming messages by the server node

CVSS3: 9
2%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-04005

Уязвимость распределённой база данных для высокопроизводительных вычислений Apache Ignite, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
2%
Низкий
11 месяцев назад

Уязвимостей на страницу