CVE-2018-8018
ignite: Improper deserialization allows for code execution via GridClientJdkMarshaller endpoint
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Apache Ignite before 2.4.8 and 2.5.x before 2.5.3, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint.
En Apache Ignite versión anterior a 2.4.8 y versión 2.5. x versión anterior a 2.5.3, el mecanismo de serialización no tiene una lista de clases permitidas para la serialización/deserialización, lo que hace posible ejecutar código arbitrario cuando las clases vulnerables de un tercero están presentes en Ignite Classpath. La vulnerabilidad se puede se puede explotar si el envía un formulario especialmente preparado de un objeto serializado hacia el endpoint de conexión de deserialización GridClientJdkMarshaller.
Red Hat Fuse enables integration experts, application developers, and business users to collaborate and independently develop connected solutions. Fuse is part of an agile integration solution. Its distributed approach allows teams to deploy integrated services where required. The API-centric, container-based architecture decouples services so they can be created, extended, and deployed independently. This release of Red Hat Fuse 7.2 serves as a replacement for Red Hat Fuse 7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, denial of service, deserialization, and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-03-09 CVE Reserved
- 2018-07-19 CVE Published
- 2024-09-17 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/104911 | Third Party Advisory | |
https://lists.apache.org/thread.html/e0fdf53114a321142ecfa5cfa17658090f0b4e1677de431e329b37ab%40%3Cdev.ignite.apache.org%3E | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:3768 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2018-8018 | 2018-12-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1607731 | 2018-12-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Ignite Search vendor "Apache" for product "Ignite" | < 2.4.8 Search vendor "Apache" for product "Ignite" and version " < 2.4.8" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Ignite Search vendor "Apache" for product "Ignite" | > 2.5.0 < 2.5.3 Search vendor "Apache" for product "Ignite" and version " > 2.5.0 < 2.5.3" | - |
Affected
|