Authentication Bypass Affecting org.apache.geode:geode-core package, versions [1.0.0,1.4.0)
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
EPSS
0.07% (29th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHEGEODE-32112
- published 26 Feb 2018
- disclosed 22 Feb 2018
- credit Unknown
Introduced: 22 Feb 2018
CVE-2017-15696 Open this link in a new tabHow to fix?
Upgrade org.apache.geode:geode-core
to version 1.4.0 or higher.
Overview
org.apache.geode:geode-core is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures.
Affected versions of this package are vulnerable to Authentication Bypass. The Geode configuration service does not properly authorize configuration requests. This allows an unprivileged user who gains access to the Geode locator to extract configuration data and previously deployed application code.