Lucene search

K
githubGitHub Advisory DatabaseGHSA-M5Q8-58WH-XXQ4
HistorySep 11, 2023 - 9:30 p.m.

Drools Core Deserialization of Untrusted Data vulnerability

2023-09-1121:30:17
CWE-502
GitHub Advisory Database
github.com
10
flaw
utility classes
deserialization
safeguards
authenticated attacker
malicious objects
code execution
server
software

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.3%

A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.

Affected configurations

Vulners
Node
org.drools\droolsMatchcore
CPENameOperatorVersion
org.drools:drools-corelt7.69.0.Final

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.3%