Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.

CVSS 1 Total

ScoreSeverityVersionVector String
8.1HIGH3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Product Status

Learn more

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are affected

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unknown

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unknown

Versions 0 Total

Default Status: All versions are unaffected

Versions 0 Total

Default Status: All versions are unknown

Versions 0 Total

Default Status: All versions are affected

Credits

  • Red Hat would like to thank Paulino Calderon (Websec) for reporting this issue.

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.

Authorized Data Publishers