Search for packages
| purl | pkg:maven/org.apache.ignite/ignite-core@2.6.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-d6hk-e64u-tbcj
Aliases: CVE-2020-1963 GHSA-5wm5-8q42-rhxg |
File system access via H2 in Apache Ignite Apache Ignite uses H2 database to build SQL distributed execution engine. H2 provides SQL functions which could be used by attacker to access to a filesystem. |
Affected by 1 other vulnerability. |
|
VCID-t38y-1dv8-b7av
Aliases: CVE-2024-52577 GHSA-8355-xj3p-hv6q |
Apache Ignite: Possible RCE when deserializing incoming messages by the server node In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-s8a4-9j7s-8fc8 | Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack. |
CVE-2018-1273
GHSA-4fq3-mr56-cg6r |
| VCID-ykug-1dhq-tygt | In Apache Ignite before 2.4.8 and 2.5.x before 2.5.3, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint. |
CVE-2018-8018
GHSA-qcjv-wfcg-mmpr |