First published: Fri Feb 11 2022(Updated: )
Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-current patch versions of Java, an attacker with client access to Cayenne ROP can transmit a malicious payload to any vulnerable third-party dependency on the server. This can result in arbitrary code execution.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Cayenne | <4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24289 is classified as a high severity vulnerability.
To fix CVE-2022-24289, upgrade Apache Cayenne to version 4.2 or later.
CVE-2022-24289 affects Apache Cayenne versions prior to 4.2.
CVE-2022-24289 is a deserialization vulnerability linked to Hessian serialization.
Yes, CVE-2022-24289 can be exploited remotely through the web services interface.