Miggo Logo

CVE-2021-41766:
Insecure Java Deserialization in Apache Karaf

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.5576%
Published
1/28/2022
Updated
9/25/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.karaf.management:org.apache.karaf.management.servermaven< 4.3.64.3.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the lack of a deserialization filter in Karaf's JMX implementation. The patch introduced the CREDENTIALS_FILTER_PATTERN to the environment map in Activator.java, which was previously missing. The start() method in Activator.java is responsible for configuring the JMX connector server's environment. Before the fix, this method did not include the critical security filter, leaving the system vulnerable to deserialization attacks. The commit diff explicitly shows the addition of this filter pattern to harden the environment, confirming the function's role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** K*r** *llows monitorin* o* *ppli**tions *n* t** J*v* runtim* *y usin* t** J*v* M*n***m*nt *xt*nsions (JMX). JMX is * J*v* RMI **s** t***nolo*y t**t r*li*s on J*v* s*ri*liz** o*j**ts *or *li*nt s*rv*r *ommuni**tion. W**r**s t** ****ult JMX impl

Reasoning

T** vuln*r**ility st*ms *rom t** l**k o* * **s*ri*liz*tion *ilt*r in K*r**'s JMX impl*m*nt*tion. T** p*t** intro*u*** t** *R***NTI*LS_*ILT*R_P*TT*RN to t** *nvironm*nt m*p in **tiv*tor.j*v*, w*i** w*s pr*viously missin*. T** st*rt() m*t*o* in **tiv*t