Skip to content

Code execution via deserialization in org.apache.ignite:ignite-core

Critical severity GitHub Reviewed Published Oct 16, 2018 to the GitHub Advisory Database • Updated Mar 4, 2024

Package

maven org.apache.ignite:ignite-core (Maven)

Affected versions

< 2.6

Patched versions

2.6

Description

Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint.

References

Published to the GitHub Advisory Database Oct 16, 2018
Reviewed Jun 16, 2020
Last updated Mar 4, 2024

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2018-8018

GHSA ID

GHSA-qcjv-wfcg-mmpr

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.