Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.
Fixes

Solution

No solution given by the vendor.


Workaround

Disable affected services such as JMX over RMI or REST APIs unless they are required. REST APIs can be disabled by setting `http-service-port` to zero.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T10:21:32.603Z

Reserved: 2022-07-29T00:00:00

Link: CVE-2022-37023

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-31T07:15:07.420

Modified: 2024-11-21T07:14:18.380

Link: CVE-2022-37023

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.