org.apache.geode:geode-core@1.2.1 vulnerabilities
-
latest version
1.15.1
-
latest non vulnerable version
-
first published
8 years ago
-
latest version published
2 years ago
-
licenses detected
- [1.0.0-incubating,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.geode:geode-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using REST API on Java 8 or Java 11. How to fix Deserialization of Untrusted Data? Upgrade |
[,1.15.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using Note: Upgrading to the fix version of the package will automatically protect users on Java 11. How to fix Deserialization of Untrusted Data? Upgrade |
[,1.15.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using Note: Users should also upgrade to Java 11. If upgrading to Java 11 is not possible, then upgrade to the fixed version and specify How to fix Deserialization of Untrusted Data? Upgrade |
[,1.15.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Information Exposure when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix How to fix Information Exposure? Upgrade |
[,1.12.5)
[1.13.0,1.13.5)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack. How to fix Man-in-the-Middle (MitM)? Upgrade |
[,1.10.0)
|
org.apache.geode:geode-core is a data management platform for cloud architectures. Affected versions of this package are vulnerable to Missing Permission Check. When an Apache Geode server is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster. How to fix Missing Permission Check? Upgrade |
[1.0.0,1.9.0)
|
org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures. Affected versions of this package are vulnerable to Arbitrary Code Execution. When a Geode server is configured with a security manager, a user with How to fix Arbitrary Code Execution? Upgrade |
[1.0.0,1.5.0)
|
Affected versions of this package are vulnerable to Authentication Bypass. The How to fix Authentication Bypass? Upgrade |
[,1.4.0)
|
org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remote code execution if certain classes are present on the classpath. How to fix Deserialization of Untrusted Data? Upgrade |
[,1.4.0)
|
org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures. Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The TcpServer within the Geode locator opens a network port that deserializes data. If an unprivileged user gains access to the Geode locator, they may be able to cause remote code execution if certain classes are present on the classpath. How to fix Deserialization of Untrusted Data? Upgrade |
[,1.4.0)
|
org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures. Affected versions of this package are vulnerable to Authentication Bypass. The Geode configuration service does not properly authorize configuration requests. This allows an unprivileged user who gains access to the Geode locator to extract configuration data and previously deployed application code. How to fix Authentication Bypass? Upgrade |
[1.0.0,1.4.0)
|
When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries containing a region name as a bind parameter that allow read access to objects within unauthorized regions. A malicious user with read access to specific regions within a Geode cluster may execute OQL queries containing a region name as a bind parameter that allow read access to objects within unauthorized regions. |
[,1.3.0)
|
When an Apache Geode cluster before v1.3.0 is operating in secure mode and an authenticated user connects to a Geode cluster using the gfsh tool with HTTP, the user is able to obtain status information and control cluster members even without CLUSTER:MANAGE privileges. |
[,1.3.0)
|
When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution. A malicious user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution. |
[,1.3.0)
|