Required CVE Record Information
Description
A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
CVSS 1 Total
Score | Severity | Version | Vector String |
---|---|---|---|
8.1 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
Product Status
Learn moreVersions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are affected
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unknown
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unknown
Versions 0 Total
Default Status: All versions are unaffected
Versions 0 Total
Default Status: All versions are unknown
Versions 0 Total
Default Status: All versions are affected
Credits
- Red Hat would like to thank Paulino Calderon (Websec) for reporting this issue.
References 3 Total
- access.redhat.com: RHSA-2022:6813 vendor-advisory
- https://access.redhat.com/security/cve/CVE-2022-1415 vdb-entry
- bugzilla.redhat.com: RHBZ#2065505 issue-tracking
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 3 Total
- access.redhat.com: RHSA-2022:6813 vendor-advisoryx_transferred
- https://access.redhat.com/security/cve/CVE-2022-1415 vdb-entryx_transferred
- bugzilla.redhat.com: RHBZ#2065505 issue-trackingx_transferred