CVE-2024-22399

Severity
9.8CRITICAL
EPSS
78.3%
top 0.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

Deserialization of Untrusted Data vulnerability in Apache Seata. When developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncontrolled serialized malicious requests by directly sending bytecode based on the Seata private protocol. This issue affects Apache Seata: 2.0.0, from 1.0.0 through 1.8.0. Users are recommended to upgrade to version 2.1.0/1.8.1, which fixes the issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDapache/seata1.0.01.8.1+1
Mavenorg.apache.seata:seata-core2.0.02.1.0+1
CVEListV5apache_software_foundation/apache_seata1.0.01.8.0+1

🔴Vulnerability Details

3
OSV
Apache Seata Deserialization of Untrusted Data vulnerability2024-09-16
GHSA
Apache Seata Deserialization of Untrusted Data vulnerability2024-09-16
CVEList
Apache Seata: Remote Code Execution vulnerability via Hessian Deserialization in Apache Seata Server2024-09-16
CVE-2024-22399 (CRITICAL CVSS 9.8) | Deserialization of Untrusted Data v | cvebase.io