First published: Tue Jun 12 2018(Updated: )
When an Apache Geode server versions 1.0.0 to 1.4.0 is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function. This allows remote code execution. Code deployment should be restricted to users with DATA:MANAGE privilege.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Geode | >=1.0.0<=1.4.0 | |
maven/org.apache.geode:geode-core | >=1.0.0<1.5.0 | 1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15695 is a vulnerability in Apache Geode server versions 1.0.0 to 1.4.0 that allows remote code execution when a user with DATA:WRITE privileges is able to deploy code by invoking an internal Geode function.
CVE-2017-15695 has a severity rating of 8.8 (High).
CVE-2017-15695 occurs when an Apache Geode server configured with a security manager allows a user with DATA:WRITE privileges to deploy code by invoking an internal Geode function.
CVE-2017-15695 can be exploited by an attacker with DATA:WRITE privileges to remotely execute code by deploying code through an internal Geode function.
To fix CVE-2017-15695, code deployment should be restricted to users with DATA:MANAGE privilege on Apache Geode servers.