oss-sec mailing list archives

CVE-2022-24289: Apache Cayenne: Deserialization of untrusted data in the Hessian Component of Apache Cayenne 4.1 with older Java versions


From: Aristedes Maniatis <amaniatis () apache org>
Date: Fri, 11 Feb 2022 02:08:41 +0000

Severity: moderate

Description:

Hessian serialization is a network protocol that supports object-based transmission.
Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides 
object persistence and query functionality to 'remote' applications.

In Apache Cayenne 4.1 and earlier, running on non-current patch versions of Java, an attacker with client access to 
Cayenne ROP can transmit a malicious payload to any vulnerable third-party dependency on the server.  This can result 
in arbitrary code execution.


Mitigation:

Either upgrade to Apache Cayenne 4.2 or a patched version of Java (after 6u211, 7u201, 8u191, and 11.0.1)

All versions of Apache Cayenne 4.2 have whitelisting enabled by default for the Hessian deserialization.  Later 
versions of Java also have LDAP mitigation in place. Users can either upgrade Java or Apache Cayenne to avoid the issue.

LDAP mitigation is present starting in JDK 6u211, 7u201, 8u191, and 11.0.1 where 
com.sun.jndi.ldap.object.trustURLCodebase system property is set to false by default to prevent JNDI from loading 
remote code through LDAP.

Credit:

Panda


Current thread: