Deserialization Vulnerability in Apache Seata by Apache
CVE-2024-47552
9.8CRITICAL
Summary
A deserialization of untrusted data vulnerability exists in Apache Seata, impacting versions from 2.0.0 up to 2.1.9. This flaw can potentially allow attackers to execute arbitrary code or manipulate application behavior through crafted serialized objects. Users are strongly advised to upgrade to version 2.2.0, which addresses this security concern and enhances overall software integrity.
Affected Version(s)
Apache Seata (incubating) 2.0.0 < 2.2.0
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
liuhuajin<[email protected]>