Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.eventmesh/eventmesh-meta-raft
  4. ›
  5. CVE-2024-56180

CVE-2024-56180: Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution

February 14, 2025 (updated February 19, 2025)

CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.

References

  • github.com/advisories/GHSA-ffvr-gmp3-xx43
  • github.com/apache/eventmesh
  • lists.apache.org/thread/k9fw0t5r7t1vbx53gs8d1r8c54rhx0wd
  • nvd.nist.gov/vuln/detail/CVE-2024-56180
  • www.cve.org/CVERecord?id=CVE-2024-56180

Code Behaviors & Features

Detect and mitigate CVE-2024-56180 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.10.1 before 1.11.0

Fixed versions

  • 1.11.0

Solution

Upgrade to version 1.11.0 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

maven/org.apache.eventmesh/eventmesh-meta-raft/CVE-2024-56180.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:54 +0000.