Lucene search

K
githubGitHub Advisory DatabaseGHSA-G2QW-6VRR-V6PQ
HistoryNov 14, 2022 - 7:00 p.m.

Apache Jena vulnerable to Deserialization of Untrusted Data

2022-11-1419:00:19
CWE-502
GitHub Advisory Database
github.com
8
apache jena
sdb
jdbc
deserialization
vulnerability
rce
mysql
eol
migration

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.046

Percentile

92.6%

Apache Jena SDB 3.17.0 and earlier is vulnerable to a JDBC Deserialisation attack if the attacker is able to control the JDBC URL used or cause the underlying database server to return malicious data. The mySQL JDBC driver in particular is known to be vulnerable to this class of attack. As a result an application using Apache Jena SDB can be subject to RCE when connected to a malicious database server. Apache Jena SDB has been EOL since December 2020 and users should migrate to alternative options e.g. Apache Jena TDB 2.

Affected configurations

Vulners
Node
org.apache.jenajena-sdbRange3.17.0
VendorProductVersionCPE
org.apache.jenajena-sdb*cpe:2.3:a:org.apache.jena:jena-sdb:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.046

Percentile

92.6%