First published: Wed Jan 08 2025(Updated: )
Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 2.1.0 before 8.0.0 Description: Default clustering instructions at https://openmeetings.apache.org/Clustering.html doesn't specify white/black lists for OpenJPA this leads to possible deserialisation of untrusted data. Users are recommended to upgrade to version 8.0.0 and update their startup scripts to include the relevant 'openjpa.serialization.class.blacklist' and 'openjpa.serialization.class.whitelist' configurations as shown in the documentation.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.openmeetings:openmeetings-parent | >=2.1.0<8.0.0 | 8.0.0 |
Apache OpenMeetings | >=2.1<8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54676 has been assigned a critical severity due to its potential for remote code execution.
To resolve CVE-2024-54676, upgrade Apache OpenMeetings to version 8.0.0 or later.
CVE-2024-54676 affects Apache OpenMeetings versions from 2.1.0 to before 8.0.0.
The implications of CVE-2024-54676 include potential unauthorized remote access and execution of arbitrary code.
Currently, there are no effective workarounds for CVE-2024-54676 besides upgrading to the fixed version.