Description
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.
No analysis available yet.
Remediation
Vendor Workaround
Disable affected services such as JMX over RMI or REST APIs unless they are required. REST APIs can be disabled by setting `http-service-port` to zero.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6726 | Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance. |
Github GHSA |
GHSA-72x9-48mc-phh6 | Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T10:21:32.603Z
Reserved: 2022-07-29T00:00:00.000Z
Link: CVE-2022-37023
No data.
Status : Modified
Published: 2022-08-31T07:15:07.420
Modified: 2024-11-21T07:14:18.380
Link: CVE-2022-37023
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA