Lucene search

K
cvelistApacheCVELIST:CVE-2023-38647
HistoryJul 26, 2023 - 7:52 a.m.

CVE-2023-38647 Apache Helix: Deserialization vulnerability in Helix workflow and REST

2023-07-2607:52:29
CWE-502
apache
www.cve.org
cve-2023-38647
apache helix
deserialization vulnerability
snakeyaml
java
urlclassloader
jar
javax.script.scriptenginemanager
remote code execution
helix-core
helix-rest
mitigation
configuration
workflow
version 1.2.0
version 1.3.0

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.3%

An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. This unbounded deserialization can likely lead to remote code execution.Β The code can be run in Helix REST start and Workflow creation.

Affect all the versions lower and include 1.2.0.

Affected products: helix-core, helix-rest

Mitigation: Short term, stop using any YAML based configuration and workflow creation.
Β  Β  Β  Β  Β  Β  Β  Β  Β  Long term, all Helix version bumping up to 1.3.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Helix",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "1.2.0",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.3%

Related for CVELIST:CVE-2023-38647