CVE-2022-37023

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-37023
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-37023.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-37023
Aliases
Published
2022-08-31T07:15:07Z
Modified
2024-10-12T10:00:11.014633Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.

References

Affected packages

Git / github.com/apache/geode

Affected ranges

Type
GIT
Repo
https://github.com/apache/geode
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

develop/highwater
sga2-core

rel/v1.*

rel/v1.0.0-incubating
rel/v1.0.0-incubating.M1
rel/v1.0.0-incubating.M2
rel/v1.0.0-incubating.M3
rel/v1.1.0
rel/v1.1.1
rel/v1.2.0
rel/v1.2.1
rel/v1.3.0
rel/v1.4.0
rel/v1.5.0
rel/v1.6.0
rel/v1.7.0
rel/v1.8.0
rel/v1.9.0