Skip to content

Apache serialization mechanism does not have a list of classes allowed for serialization/deserialization

Critical severity GitHub Reviewed Published Oct 16, 2018 to the GitHub Advisory Database • Updated Apr 19, 2024

Package

maven org.apache.ignite:ignite-core (Maven)

Affected versions

< 2.4

Patched versions

2.4

Description

In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer.

References

Published to the GitHub Advisory Database Oct 16, 2018
Reviewed Jun 16, 2020
Last updated Apr 19, 2024

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2018-1295

GHSA ID

GHSA-chp4-rv79-68j3

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.