CVE-2021-41766:
Insecure Java Deserialization in Apache Karaf
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.5576%
CWE
Published
1/28/2022
Updated
9/25/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.karaf.management:org.apache.karaf.management.server | maven | < 4.3.6 | 4.3.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the lack of a deserialization filter in Karaf's JMX implementation. The patch introduced the CREDENTIALS_FILTER_PATTERN to the environment map in Activator.java, which was previously missing. The start() method in Activator.java is responsible for configuring the JMX connector server's environment. Before the fix, this method did not include the critical security filter, leaving the system vulnerable to deserialization attacks. The commit diff explicitly shows the addition of this filter pattern to harden the environment, confirming the function's role in the vulnerability.