Miggo Logo

CVE-2022-37021: Apache Geode vulnerable to Deserialization of Untrusted Data

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.61986%
Published
9/1/2022
Updated
3/10/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.geode:geode-coremaven< 1.12.161.12.16
org.apache.geode:geode-coremaven>= 1.13.0, < 1.13.51.13.5
org.apache.geode:geode-coremaven>= 1.14.0, < 1.14.11.14.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability involves insecure deserialization via JMX/RMI in Java 8. Key functions include those initializing JMX services (JmxManager.startJmxManager) and handling RMI deserialization (RemoteFilterChain.readObject). These functions likely lacked serialization filters in vulnerable versions, as the patch introduces a system property to enable filtering. The confidence is medium due to inferred code behavior from vulnerability descriptions and Java RMI/JMX patterns, though exact patch details are unavailable.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** **o** v*rsions up to *.**.*, *.**.* *n* *.**.* *r* vuln*r**l* to * **s*ri*liz*tion o* untrust** **t* *l*w w**n usin* JMX ov*r RMI on J*v* *. *ny us*r still on J*v* * w*o wis**s to prot**t ***inst **s*ri*liz*tion *tt**ks involvin* JMX or RMI s*

Reasoning

T** vuln*r**ility involv*s ins**ur* **s*ri*liz*tion vi* JMX/RMI in J*v* *. K*y *un*tions in*lu** t*os* initi*lizin* JMX s*rvi**s (JmxM*n***r.st*rtJmxM*n***r) *n* **n*lin* RMI **s*ri*liz*tion (R*mot**ilt*r***in.r***O*j**t). T**s* *un*tions lik*ly l**k