Information Exposure Affecting org.apache.geode:geode-pulse Open this link in a new tab package, versions [,1.1.1)
Attack Complexity
Low
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGAPACHEGEODE-31446
-
published
21 May 2017
-
disclosed
4 Apr 2017
-
credit
Jinmei Liao
Introduced: 4 Apr 2017
CVE-2017-5649 Open this link in a new tabHow to fix?
Upgrade org.apache.geode:geode-pulse
to version 1.1.1 or higher.
Overview
Affected versions of this package are vulnerable to Information Exposure.
Overview
Apache Geode before 1.1.1, when a cluster has enabled security by setting the security-manager
property, allows remote authenticated users with CLUSTER:READ
but not DATA:READ
permission to access the data browser page in Pulse and consequently execute an OQL query that exposes data stored in the cluster.