Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
References
Configurations
History
07 Nov 2023, 03:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
27 Jul 2023, 15:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Scala-lang scala-collection-compat
|
|
CPE | cpe:2.3:a:scala-lang:scala-collection-compat:*:*:*:*:*:*:*:* |
Information
Published : 2022-09-23 18:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-36944
Mitre link : CVE-2022-36944
CVE.ORG link : CVE-2022-36944
JSON object : View
Products Affected
fedoraproject
- fedora
scala-lang
- scala-collection-compat
- scala
CWE
CWE-502
Deserialization of Untrusted Data