oss-sec mailing list archives

RE: [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114


From: "Rai, Harendra" <Harendra.Rai () ncr com>
Date: Tue, 5 Jun 2018 17:11:11 +0000

I found other security issues and I have created a bug. https://issues.apache.org/jira/browse/IGNITE-8713


Harendra Rai
Software Engineer
NCR Corporation
office: 770.495.2864
mobile: 248.787.2876
harendra.rai () ncr com<mailto:harendra.rai () ncr com>
www.ncr.com<http://www.ncr.com>
[cid:image003.png@01D0405E.86F4AD70]

From: Denis Magda [mailto:dmagda () apache org]
Sent: Friday, June 01, 2018 1:17 PM
To: announce () apache org; dev <dev () ignite apache org>; user () ignite apache org; oss-security () lists openwall 
com; Rai, Harendra <Harendra.Rai () ncr com>
Subject: [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114

[CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Ignite 2.4 or earlier

Impact:
An attacker can execute arbitrary code on Ignite nodes in the case when Ignite classpath contains arbitrary vulnerable 
classes.

Description:
Apache Ignite used commons-beanutils-1.8.3.jar library which did not suppress the class property, which allowed remote 
attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the 
passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Mitigation:
•    All Ignite versions: make sure there are no vulnerable classes among your custom code used in Apache Ignite.
•    Upgrade to Apache Ignite 2.5 or later version

Credit:
Harendra Rai of NCR Corporation discovered the impact of the existing vulnerability on Apache Ignite.

References:
* 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114<https://urldefense.proofpoint.com/v2/url?u=https-3A__cve.mitre.org_cgi-2Dbin_cvename.cgi-3Fname-3DCVE-2D2014-2D0114&d=DwMFaQ&c=gJN2jf8AyP5Q6Np0yWY19w&r=9MqLDuI-YOHfnUsZj8zKAiE5cb4pd-EqZwfbefzAn18&m=O7V5T4VKtGxA1W7Dnp3dZmxv7FT2fy722704x0eAntk&s=shK2q4cumx70o8xqWHBcY19R-DVSgNIy32P-zTTbJNo&e=>

Current thread: