Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.jena/jena-sdb
  4. ›
  5. CVE-2022-45136

CVE-2022-45136: Deserialization of Untrusted Data

November 14, 2022 (updated November 17, 2022)

** UNSUPPORTED WHEN ASSIGNED ** Apache Jena SDB 3.17.0 and earlier is vulnerable to a JDBC Deserialisation attack if the attacker is able to control the JDBC URL used or cause the underlying database server to return malicious data. The mySQL JDBC driver in particular is known to be vulnerable to this class of attack. As a result an application using Apache Jena SDB can be subject to RCE when connected to a malicious database server. Apache Jena SDB has been EOL since December 2020 and users should migrate to alternative options e.g. Apache Jena TDB 2.

References

  • www.openwall.com/lists/oss-security/2022/11/14/5
  • github.com/advisories/GHSA-g2qw-6vrr-v6pq
  • lists.apache.org/thread/mc77cdl5stgjtjoldk467gdf756qjt31
  • nvd.nist.gov/vuln/detail/CVE-2022-45136

Code Behaviors & Features

Detect and mitigate CVE-2022-45136 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

maven/org.apache.jena/jena-sdb/CVE-2022-45136.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:57 +0000.