CVE-2018-1295
02.04.2018, 17:29
In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer.Enginsight
Vendor | Product | Version |
---|---|---|
apache | ignite | 𝑥 ≤ 2.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References