9.8
CVSSv3

CVE-2022-36944

Published: 23/09/2022 Updated: 03/02/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9

Vulnerability Summary

Scala 2.13.x prior to 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows malicious users to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

scala-lang scala

fedoraproject fedora 35

fedoraproject fedora 36

Github Repositories

CVE-2022-36944 Scala 213x before 2139 has a Java deserialization chain in its JAR file On its own, it cannot be exploited There is only a risk in conjunction with Java object deserialization within an application In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0