|
Message-ID: <9284b6a9-4d9f-5e70-43e8-7ba7e7e49f1f@apache.org> Date: Thu, 31 Oct 2024 03:12:05 +0000 From: Paul Irwin <paulirwin@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-43383: Apache Lucene.Net.Replicator: Remote Code Execution in Lucene.Net.Replicator Affected versions: - Apache Lucene.Net.Replicator 4.8.0-beta00005 through 4.8.0-beta00016 Description: Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator. This issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016. An attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access. Users are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue. Credit: Summ3r, Vidar-Team (reporter) Apache Lucene (remediation developer) References: https://lucenenet.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-43383
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.