CVE-2022-37023

Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.
References
Link Resource
https://lists.apache.org/thread/6js89pbqrp52zlpwgry5fsdn76gxbbfj Mailing List Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-08-31 07:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-37023

Mitre link : CVE-2022-37023

CVE.ORG link : CVE-2022-37023


JSON object : View

Products Affected

apache

  • geode
CWE
CWE-502

Deserialization of Untrusted Data