CVE-2022-37023Deserialization of Untrusted Data in Software Foundation Apache Geode

Severity
6.5MEDIUMNVD
EPSS
0.5%
top 35.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 31
Latest updateSep 1

Description

Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDapache/geode< 1.15.0
CVEListV5apache_software_foundation/apache_geodeApache Geode1.15.0

🔴Vulnerability Details

3
OSV
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data2022-09-01
GHSA
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data2022-09-01
CVEList
Apache Geode deserialization of untrusted data flaw when using REST API on Java 8 or Java 112022-08-31
CVE-2022-37023 — Deserialization of Untrusted Data | cvebase