CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 14 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 14 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue. | |
Title | Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution | |
Weaknesses | CWE-502 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-02-14T13:34:26.600Z
Updated: 2025-02-18T15:10:16.650Z
Reserved: 2024-12-18T07:46:43.781Z
Link: CVE-2024-56180

Updated: 2025-02-14T17:02:37.296Z

Status : Received
Published: 2025-02-14T14:15:32.267
Modified: 2025-02-18T15:15:16.500
Link: CVE-2024-56180

No data.