漏洞标题
Apache Ignite:服务器节点在反序列化进入消息时可能存在RCE漏洞
漏洞描述信息
在Apache Ignite 2.6.0到2.17.0版本中,配置的类序列化过滤器对于某些Ignite端点被忽略。如果攻击者手动构造一个包含易受攻击对象的Ignite消息(该对象的类存在于Ignite服务器的类路径中),并将其发送到Ignite服务器端点,那么Ignite服务器对此类消息的反序列化可能导致在Apache Ignite服务器端执行任意代码。
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
可信数据的反序列化
漏洞标题
Apache Ignite: Possible RCE when deserializing incoming messages by the server node
漏洞描述信息
In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.
CVSS信息
N/A
漏洞类别
可信数据的反序列化