First published: Wed Jan 10 2018(Updated: )
When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Geode | <1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9795 is high with a severity value of 7.5.
The affected software for CVE-2017-9795 is Apache Geode version up to but excluding 1.3.0.
A user with read access to specific regions within a Geode cluster can execute OQL queries that allow read and write access to objects within unauthorized regions and also invoke methods that allow remote code execution.
Yes, there are references related to CVE-2017-9795. You can find them here: [Link 1](http://www.securityfocus.com/bid/102488), [Link 2](https://lists.apache.org/thread.html/0fc5ea3c1ea06fe7058a0ab56d593914b05f728a6c93c5a6755956c7@%3Cuser.geode.apache.org%3E), [Link 3](https://lists.apache.org/thread.html/232d75150991820d2fe6ba6bd4265fb58b4fe4d9d8d62eb2fd97256c@%3Cdev.geode.apache.org%3E).
To fix CVE-2017-9795, it is recommended to upgrade to Apache Geode version 1.3.0 or later.