CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
History

Tue, 18 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
References

Fri, 14 Feb 2025 13:45:00 +0000

Type Values Removed Values Added
Description CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
Title Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution
Weaknesses CWE-502
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-02-14T13:34:26.600Z

Updated: 2025-02-18T15:10:16.650Z

Reserved: 2024-12-18T07:46:43.781Z

Link: CVE-2024-56180

cve-icon Vulnrichment

Updated: 2025-02-14T17:02:37.296Z

cve-icon NVD

Status : Received

Published: 2025-02-14T14:15:32.267

Modified: 2025-02-18T15:15:16.500

Link: CVE-2024-56180

cve-icon Redhat

No data.