Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data
Moderate severity
GitHub Reviewed
Published
Sep 1, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Aug 31, 2022
Published to the GitHub Advisory Database
Sep 1, 2022
Reviewed
Sep 16, 2022
Last updated
Jan 27, 2023
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.
References