First published: Wed Oct 02 2024(Updated: )
A vulnerability was found in Apache Avro. The project would be affected if it accepts an Avro schema for parsing provided by the end-user. By using the special "java-class" attribute an attacker can trigger remote code execution. The issue is fixed in Avro 1.11.4 and 1.12.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.avro:avro | <1.11.4 | 1.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47561 is a critical vulnerability due to potential remote code execution risks in Apache Avro.
To fix CVE-2024-47561, upgrade to Apache Avro version 1.11.4 or later.
CVE-2024-47561 affects all versions of Apache Avro prior to 1.11.4.
Yes, CVE-2024-47561 can be exploited if Apache Avro is configured to accept schemas from untrusted users.
If upgrading is not possible, implement strict input validation and avoid accepting user-defined schemas to mitigate CVE-2024-47561.