org.apache.geode:geode-core@1.8.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.geode:geode-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using REST API on Java 8 or Java 11.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.15.0 or higher.

[,1.15.0)
  • C
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using JMX over RMI on Java 11.

Note: Upgrading to the fix version of the package will automatically protect users on Java 11.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.15.0 or higher.

[,1.15.0)
  • C
Deserialization of Untrusted Data

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data when using JMX over RMI on Java 8.

Note: Users should also upgrade to Java 11.

If upgrading to Java 11 is not possible, then upgrade to the fixed version and specify --J=-Dgeode.enableGlobalSerialFilter=true when starting any Locators or Servers.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.geode:geode-core to version 1.15.0 or higher.

[,1.15.0)
  • M
Information Exposure

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Information Exposure when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix sysprop-, javax.net.ssl, or security-.

How to fix Information Exposure?

Upgrade org.apache.geode:geode-core to version 1.12.5, 1.13.5 or higher.

[,1.12.5) [1.13.0,1.13.5)
  • H
Man-in-the-Middle (MitM)

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.apache.geode:geode-core to version 1.10.0 or higher.

[,1.10.0)
  • H
Missing Permission Check

org.apache.geode:geode-core is a data management platform for cloud architectures.

Affected versions of this package are vulnerable to Missing Permission Check. When an Apache Geode server is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.

How to fix Missing Permission Check?

Upgrade org.apache.geode:geode-core to version 1.9.0 or higher.

[1.0.0,1.9.0)