Deserialization of Untrusted Data Affecting apache-jena package, versions <4.5.0-1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
4.08% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Deserialization of Untrusted Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-APACHEJENA-3114427
  • published15 Nov 2022
  • disclosed14 Nov 2022

Introduced: 14 Nov 2022

CVE-2022-45136  (opens in a new tab)
CWE-502  (opens in a new tab)

How to fix?

Upgrade Debian:unstable apache-jena to version 4.5.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream apache-jena package and not the apache-jena package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Apache Jena SDB 3.17.0 and earlier is vulnerable to a JDBC Deserialisation attack if the attacker is able to control the JDBC URL used or cause the underlying database server to return malicious data. The mySQL JDBC driver in particular is known to be vulnerable to this class of attack. As a result an application using Apache Jena SDB can be subject to RCE when connected to a malicious database server. Apache Jena SDB has been EOL since December 2020 and users should migrate to alternative options e.g. Apache Jena TDB 2.

CVSS Scores

version 3.1