Information Exposure Affecting org.apache.geode:geode-pulse package, versions [,1.1.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEGEODE-31446
  • published21 May 2017
  • disclosed4 Apr 2017
  • creditJinmei Liao

Introduced: 4 Apr 2017

CVE-2017-5649  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.apache.geode:geode-pulse to version 1.1.1 or higher.

Overview

Apache Geode before 1.1.1, when a cluster has enabled security by setting the security-manager property, allows remote authenticated users with CLUSTER:READ but not DATA:READ permission to access the data browser page in Pulse and consequently execute an OQL query that exposes data stored in the cluster.

CVSS Base Scores

version 3.1