Vulnerability Description
In Apache Geode before v1.4.0, the Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remote code execution if certain classes are present on the classpath.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Geode | < 1.4.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/103206Third Party AdvisoryVDB Entry
- https://lists.apache.org/thread.html/cc3ec1d06062f54fdaa0357874c1d148fc54bb955f2
- http://www.securityfocus.com/bid/103206Third Party AdvisoryVDB Entry
- https://lists.apache.org/thread.html/cc3ec1d06062f54fdaa0357874c1d148fc54bb955f2
FAQ
What is CVE-2017-15693?
CVE-2017-15693 is a vulnerability with a CVSS score of 7.5 (HIGH). In Apache Geode before v1.4.0, the Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:W...
How severe is CVE-2017-15693?
CVE-2017-15693 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15693?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Geode.