First published: Fri Feb 14 2025(Updated: )
CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache EventMesh | >=undefined | |
maven/org.apache.eventmesh:eventmesh-meta-raft | >=1.10.1<1.11.0 | 1.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56180 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-56180, update to the latest version of Apache EventMesh that addresses this vulnerability.
CVE-2024-56180 affects Apache EventMesh on Windows, Linux, and macOS platforms.
CVE-2024-56180 is a deserialization of untrusted data vulnerability.
Yes, attackers can exploit CVE-2024-56180 remotely through controlled messages sent via hessian deserialization RPC.