Class Serialization Filter Bypass in Apache Ignite by Apache
CVE-2024-52577
What is CVE-2024-52577?
CVE-2024-52577 is a vulnerability found in Apache Ignite, an open-source distributed database and processing platform. The flaw pertains to a class serialization filter bypass which can allow unauthorized deserialization of crafted messages sent to specific Ignite server endpoints. This vulnerability poses a serious risk to organizations using Apache Ignite as it could enable malicious actors to execute arbitrary code on the server, potentially compromising system integrity and leading to severe operational disruptions.
Technical Details
The vulnerability exists in Apache Ignite versions ranging from 2.6.0 to just before 2.17.0. It allows attackers to bypass configured class serialization filters that secure Ignite endpoints. By crafting an Ignite message that includes a vulnerable object class available in the Ignite server's classpath, an attacker can exploit this weakness. Upon deserialization of such messages, the Ignite server might inadvertently execute malicious code, granting the attacker control over the server's operations.
Potential impact of CVE-2024-52577
-
Arbitrary Code Execution: The primary impact of this vulnerability is the potential for execution of arbitrary code on the server side, leading to unauthorized access and control over the system.
-
System Compromise: Exploiting this vulnerability can result in a complete compromise of the affected Apache Ignite server, allowing attackers to manipulate data, exfiltrate sensitive information, or disrupt service.
-
Increased Attack Surface: The presence of this vulnerability increases the overall risk exposure for organizations, as it represents a pathway for attackers to leverage other vulnerabilities or initiate further attacks within the network.
Affected Version(s)
Apache Ignite 2.6.0 < 2.17.0
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved