First published: Fri Sep 23 2022(Updated: )
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Scala-lang Scala | >=2.13.0<2.13.9 | |
Scala-lang Scala-collection-compat | <2.9.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/scala | <2.13.9 | 2.13.9 |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36944 is a vulnerability in Scala 2.13.x before version 2.13.9 that allows attackers to erase contents of arbitrary files and make network connections.
CVE-2022-36944 can only be exploited in conjunction with Java object deserialization within an application.
The severity of CVE-2022-36944 is critical.
Scala 2.13.x versions from 2.13.0 to 2.13.9 are affected by CVE-2022-36944.
To fix CVE-2022-36944, upgrade Scala to version 2.13.9 or higher.