First published: Mon Jan 22 2024(Updated: )
Clojure could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially crafted serialized object, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.clojure:clojure | <1.9.0 | 1.9.0 |
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
Clojure | <1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-20189 has a high severity rating due to the potential for remote code execution by attackers.
To fix CVE-2017-20189, upgrade Clojure to version 1.9.0 or later.
CVE-2017-20189 affects versions of Clojure prior to 1.9.0, as well as specific versions of IBM Cognos Analytics.
CVE-2017-20189 is categorized as an unsafe deserialization vulnerability.
An attacker could execute arbitrary code on the system by sending a specially crafted serialized object.