Class Serialization Filter Bypass in Apache Ignite by Apache
CVE-2024-52577

9.5CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
14 February 2025

What is CVE-2024-52577?

CVE-2024-52577 is a vulnerability found in Apache Ignite, an open-source distributed database and processing platform. The flaw pertains to a class serialization filter bypass which can allow unauthorized deserialization of crafted messages sent to specific Ignite server endpoints. This vulnerability poses a serious risk to organizations using Apache Ignite as it could enable malicious actors to execute arbitrary code on the server, potentially compromising system integrity and leading to severe operational disruptions.

Technical Details

The vulnerability exists in Apache Ignite versions ranging from 2.6.0 to just before 2.17.0. It allows attackers to bypass configured class serialization filters that secure Ignite endpoints. By crafting an Ignite message that includes a vulnerable object class available in the Ignite server's classpath, an attacker can exploit this weakness. Upon deserialization of such messages, the Ignite server might inadvertently execute malicious code, granting the attacker control over the server's operations.

Potential impact of CVE-2024-52577

  1. Arbitrary Code Execution: The primary impact of this vulnerability is the potential for execution of arbitrary code on the server side, leading to unauthorized access and control over the system.

  2. System Compromise: Exploiting this vulnerability can result in a complete compromise of the affected Apache Ignite server, allowing attackers to manipulate data, exfiltrate sensitive information, or disrupt service.

  3. Increased Attack Surface: The presence of this vulnerability increases the overall risk exposure for organizations, as it represents a pathway for attackers to leverage other vulnerabilities or initiate further attacks within the network.

Affected Version(s)

Apache Ignite 2.6.0 < 2.17.0

References

CVSS V4

Score:
9.5
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zhattatey ([email protected])
zhattatey ([email protected])
Mikhail Petrov ([email protected])
Alex Plehanov ([email protected])
.