[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] [SECURITY] CVE-2017-15696 Apache Geode configuration request authorization vulnerabil
From:       Anthony Baker <abaker () apache ! org>
Date:       2018-02-22 21:46:43
Message-ID: CAEwge-GQLV_9Y56psCejkhA-B3jx4amnQP5AoVwURbzn=DCZOw () mail ! gmail ! com
[Download RAW message or body]

CVE-2017-15696 Apache Geode configuration request authorization vulnerability

Severity:  Important

Vendor: The Apache Software Foundation

Versions Affected:  Apache Geode 1.0.0 through 1.3.0

Description:
The Geode configuration service does not properly authorize
configuration requests.  This allows an unprivileged user who gains
access to the Geode locator to extract configuration data and
previously deployed application code.

Mitigation:
Users of the affected versions should upgrade to Apache Geode 1.4.0 or later.

Credit:
This issue was reported responsibly to the Apache Geode Security Team
by Dan Smith from Pivotal.

References:
[1] https://issues.apache.org/jira/browse/GEODE-3962
[2] https://cwiki.apache.org/confluence/display/GEODE/Release+Notes#ReleaseNotes-SecurityVulnerabilities
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic