-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.geode:geode-core | maven | >= 1.0.0, < 1.2.1 | 1.2.1 |
The vulnerability stemmed from improper isolation of security contexts in gfsh's multi-step query implementation. The JIRA ticket GEODE-3217 explicitly shows the fix required converting QueryCommand to single-step execution. The executeStep method and command executor infrastructure would be involved in handling intermediate command states. These functions would appear in profiler traces during query execution as they process user input and manage command flow. The removal of multi-step handling in 1.2.1 confirms these were the vulnerable code paths.
A Semantic Attack on Google Gemini - Read the Latest Research