CVE-2018-1295
CRITICALApache Ignite < 2.3.0 - Insecure Deserialization
Title source: ruleDescription
In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer.
Scores
CVSS v3
9.8
EPSS
0.0558
EPSS Percentile
90.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (2)
apache/ignite
< 2.3.0
org.apache.ignite/ignite-core
< 2.4Maven
Timeline
Published
Apr 02, 2018
Tracked Since
Feb 18, 2026