CVE-2022-24082

If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:49

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://support.pega.com/support-doc/pega-security-advisory-b22-vulnerability-%E2%80%93-hotfix-matrix-0 - Vendor Advisory () https://support.pega.com/support-doc/pega-security-advisory-b22-vulnerability-%E2%80%93-hotfix-matrix-0 - Vendor Advisory

Information

Published : 2022-07-19 15:15

Updated : 2024-11-21 06:49


NVD link : CVE-2022-24082

Mitre link : CVE-2022-24082

CVE.ORG link : CVE-2022-24082


JSON object : View

Products Affected

pega

  • infinity
CWE
CWE-502

Deserialization of Untrusted Data