Remote Code Execution Vulnerability in Apache Geode Server
CVE-2017-15693
7.5HIGH
Summary
In Apache Geode versions prior to 1.4.0, the Geode server's handling of application objects in serialized form creates a significant security risk. When certain cluster operations or API invocations occur, these serialized objects are deserialized. A malicious user with DATA:WRITE access can exploit this mechanism to execute arbitrary code on the server if the right classes exist on the classpath, potentially leading to unauthorized control over the affected system.
Affected Version(s)
Apache Geode 1.0.0 to 1.3.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved