Description
In Apache Geode before v1.4.0, the Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remote code execution if certain classes are present on the classpath.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3292 | In Apache Geode before v1.4.0, the Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remote code execution if certain classes are present on the classpath. |
Github GHSA |
GHSA-95m2-p98f-24r5 | Apache Geode unsafe deserialization of application objects |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T23:26:07.455Z
Reserved: 2017-10-21T00:00:00.000Z
Link: CVE-2017-15693
No data.
Status : Modified
Published: 2018-02-27T15:29:00.257
Modified: 2024-11-21T03:15:01.027
Link: CVE-2017-15693
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA