Deserialization Vulnerability in Apache Seata by Apache
CVE-2024-22399
9.8CRITICAL
Summary
A vulnerability exists in Apache Seata that allows attackers to exploit deserialization of untrusted data. This occurs when developers disable authentication on the Seata-Server and do not utilize the Seata client SDK dependencies. Malicious actors can send improperly constructed serialized requests using bytecode that adheres to the Seata private protocol. This flaw affects versions of Apache Seata from 1.0.0 to 1.8.0 and is present in version 2.0.0. Users are advised to upgrade to version 2.1.0 or 1.8.1, which address this vulnerability.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published