NA

CVE-2022-1415

Published: 11/09/2023 Updated: 07/11/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated malicious user to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat decision manager 7.0

redhat process automation 7.0

redhat jboss middleware text-only advisories -

redhat drools 7.69.0

Vendor Advisories

Description<!----> This CVE is under investigation by Red Hat Product Security ...

Github Repositories

My security advisories

My latest public security advisories CVE-2022-21404: Applications using Oracle Helidon versions 09x, 010x, 011x, 10x, 11x, 12x, 13x, 14x, 200-M1, 200-M2, 200-M3, 200-M4 and 200-RC1 are affected by a remote code execution vulnerability caused by insecure YAML deserialization when using the class UrlConfigSource for loading configuration files remotely