Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9284b6a9-4d9f-5e70-43e8-7ba7e7e49f1f@apache.org>
Date: Thu, 31 Oct 2024 03:12:05 +0000
From: Paul Irwin <paulirwin@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-43383: Apache Lucene.Net.Replicator: Remote Code
 Execution in Lucene.Net.Replicator 

Affected versions:

- Apache Lucene.Net.Replicator 4.8.0-beta00005 through 4.8.0-beta00016

Description:

Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator.

This issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016.

An attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access.


Users are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue.

Credit:

Summ3r, Vidar-Team (reporter)
Apache Lucene (remediation developer)

References:

https://lucenenet.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-43383

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.