GHSA-ffvr-gmp3-xx43

Suggest an improvement
Source
https://github.com/advisories/GHSA-ffvr-gmp3-xx43
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-ffvr-gmp3-xx43/GHSA-ffvr-gmp3-xx43.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-ffvr-gmp3-xx43
Aliases
  • CVE-2024-56180
Published
2025-02-14T15:31:05Z
Modified
2025-02-19T18:27:05.503375Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution
Details

CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.

Database specific
{
    "nvd_published_at": "2025-02-14T14:15:32Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2025-02-19T17:48:09Z"
}
References

Affected packages

Maven / org.apache.eventmesh:eventmesh-meta-raft

Package

Name
org.apache.eventmesh:eventmesh-meta-raft
View open source insights on deps.dev
Purl
pkg:maven/org.apache.eventmesh/eventmesh-meta-raft

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.10.1
Fixed
1.11.0