org.apache.geode:geode-core@1.1.0 vulnerabilities

Apache Geode provides a database-like consistency model, reliable transaction processing and a shared-nothing architecture to maintain very low latency performance with high concurrency processing

Direct Vulnerabilities

Known vulnerabilities in the org.apache.geode:geode-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using REST API on Java 8 or Java 11.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.15.0 or higher.

(,1.15.0)
  • C
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using JMX over RMI on Java 11.

Note: Upgrading to the fix version of the package will automatically protect users on Java 11.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.15.0 or higher.

(,1.15.0)
  • C
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using JMX over RMI on Java 8.

Note: Users should also upgrade to Java 11.

If upgrading to Java 11 is not possible, then upgrade to the fixed version and specify --J=-Dgeode.enableGlobalSerialFilter=true when starting any Locators or Servers.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.15.0 or higher.

(,1.15.0)
  • M
Information Exposure

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Information Exposure when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix sysprop-, javax.net.ssl, or security-.

How to fix Information Exposure?

Upgrade org.apache.geode:geode-core to version 1.12.5, 1.13.5 or higher.

(,1.12.5) [1.13.0,1.13.5)
  • H
Man-in-the-Middle (MitM)

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.apache.geode:geode-core to version 1.10.0 or higher.

(,1.10.0)
  • H
Missing Permission Check

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Missing Permission Check. When an Apache Geode server is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.

How to fix Missing Permission Check?

Upgrade org.apache.geode:geode-core to version 1.9.0 or higher.

[1.0.0,1.9.0)
  • H
Arbitrary Code Execution

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

Affected versions of this package are vulnerable to Arbitrary Code Execution. When a Geode server is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function.

How to fix Arbitrary Code Execution?

Upgrade org.apache.geode:geode-core to version 1.5.0 or higher.

[1.0.0,1.5.0)
  • M
Authentication Bypass

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

Affected versions of this package are vulnerable to Authentication Bypass. The CacheClientProxy could be asked to authorize a message prior to receiving its security subject.

How to fix Authentication Bypass?

Upgrade org.apache.geode:geode-core to version 1.4.0 or higher.

(,1.4.0)
  • H
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remote code execution if certain classes are present on the classpath.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.4.0 or higher.

(,1.4.0)
  • C
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The TcpServer within the Geode locator opens a network port that deserializes data. If an unprivileged user gains access to the Geode locator, they may be able to cause remote code execution if certain classes are present on the classpath.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.4.0 or higher.

(,1.4.0)
  • H
Authentication Bypass

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

Affected versions of this package are vulnerable to Authentication Bypass. The Geode configuration service does not properly authorize configuration requests. This allows an unprivileged user who gains access to the Geode locator to extract configuration data and previously deployed application code.

How to fix Authentication Bypass?

Upgrade org.apache.geode:geode-core to version 1.4.0 or higher.

[1.0.0,1.4.0)
  • M
Arbitrary OQL Query Execution

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries containing a region name as a bind parameter that allow read access to objects within unauthorized regions.

A malicious user with read access to specific regions within a Geode cluster may execute OQL queries containing a region name as a bind parameter that allow read access to objects within unauthorized regions.

(,1.3.0)
  • H
Information Exposure

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

When an Apache Geode cluster before v1.3.0 is operating in secure mode and an authenticated user connects to a Geode cluster using the gfsh tool with HTTP, the user is able to obtain status information and control cluster members even without CLUSTER:MANAGE privileges.

(,1.3.0)
  • H
Arbitrary Code Execution

org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.

When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.

A malicious user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.

(,1.3.0)
  • M
Information Exposure

Affected versions of org.apache.geode:geode-core are vulnerable to Information Exposure. When an Apache Geode cluster before v1.2.1 is operating in secure mode, an unauthenticated client can enter multi-user authentication mode and send metadata messages. These metadata operations could leak information about application data types. In addition, an attacker could perform a denial of service attack on the cluster.

How to fix Information Exposure?

Upgrade org.apache.geode:geode-core to version 1.2.1 or higher.

(,1.2.1)
  • M
Information Exposure

Affected versions of org.apache.geode:geode-core are vulnerable to Information Exposure. When a cluster is operating in secure mode, a user with read privileges for specific data regions can use the gfsh command line utility to execute queries. In Apache Geode before 1.2.1, the query results may contain data from another user's concurrently executing gfsh query, potentially revealing data that the user is not authorized to view.

How to fix Information Exposure?

Upgrade org.apache.geode:geode-core to version 1.2.1 or higher.

(,1.2.1)