Deserialization Vulnerability in Apache Seata by Apache
CVE-2024-22399

9.8CRITICAL

Key Information:

Vendor
Apache
Status
Vendor
CVE Published:
16 September 2024

Summary

A vulnerability exists in Apache Seata that allows attackers to exploit deserialization of untrusted data. This occurs when developers disable authentication on the Seata-Server and do not utilize the Seata client SDK dependencies. Malicious actors can send improperly constructed serialized requests using bytecode that adheres to the Seata private protocol. This flaw affects versions of Apache Seata from 1.0.0 to 1.8.0 and is present in version 2.0.0. Users are advised to upgrade to version 2.1.0 or 1.8.1, which address this vulnerability.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.