Vulnerability Description
Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Olingo | >= 4.0.0, <= 4.6.0 |
Related Weaknesses (CWE)
References
- https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSMailing ListVendor Advisory
- https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSMailing ListVendor Advisory
FAQ
What is CVE-2019-17556?
CVE-2019-17556 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious met...
How severe is CVE-2019-17556?
CVE-2019-17556 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17556?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Olingo.