CWE
502
Advisory Published
Updated

CVE-2022-36944

First published: Fri Sep 23 2022(Updated: )

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Scala-lang Scala>=2.13.0<2.13.9
Scala-lang Scala-collection-compat<2.9.0
Fedoraproject Fedora=35
Fedoraproject Fedora=36
redhat/scala<2.13.9
2.13.9
IBM IBM® Engineering Requirements Management DOORS<=9.7.2.7
IBM IBM® Engineering Requirements Management DOORS Web Access<=9.7.2.7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-36944?

    CVE-2022-36944 is a vulnerability in Scala 2.13.x before version 2.13.9 that allows attackers to erase contents of arbitrary files and make network connections.

  • How can CVE-2022-36944 be exploited?

    CVE-2022-36944 can only be exploited in conjunction with Java object deserialization within an application.

  • What is the severity of CVE-2022-36944?

    The severity of CVE-2022-36944 is critical.

  • Which software versions are affected by CVE-2022-36944?

    Scala 2.13.x versions from 2.13.0 to 2.13.9 are affected by CVE-2022-36944.

  • How do I fix CVE-2022-36944?

    To fix CVE-2022-36944, upgrade Scala to version 2.13.9 or higher.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203