9.8
CVSSv3

CVE-2022-36944

Published: 23/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Scala 2.13.x prior to 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows malicious users to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

scala-lang scala

scala-lang scala-collection-compat

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

概述 Important: Red Hat AMQ Streams 240 release and security update 类型/严重性 Security Advisory: Important 标题 Red Hat AMQ Streams 240 is now available from the Red Hat Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base scor ...

Github Repositories

POC for the CVE-2022-36944 vulnerability exploit

CVE-2022-36944 payload generator This mini-project is created to demonstrate proof of concept of CVE-2022-36944 vulnerability It is similar to ysoserial, but generates payload only for this CVE with LazyList class Quick FAQ What artifacts bring the vulnerability? orgscala-lang:scala-library with versions 213x before 2139 What applications are vulnerable? Two conditions m