8.1
CVE-2024-43383
- EPSS 1.94%
- Published 31.10.2024 10:15:04
- Last modified 11.02.2025 16:13:52
- Source security@apache.org
- Teams watchlist Login
- Open Login
Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator. This issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016. An attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access. Users are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue.
Data is provided by the National Vulnerability Database (NVD)
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00005
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00006
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00007
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00008
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00009
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00010
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00011
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00012
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00013
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00014
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00015
Apache ≫ Lucene.Net Version4.8.0 Updatebeta00016
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.94% | 0.827 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
security@apache.org | 8 | 2.1 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.