Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.juddi/juddi-core
  4. ›
  5. CVE-2021-37578

CVE-2021-37578: Deserialization of Untrusted Data

August 9, 2021 (updated August 31, 2021)

Apache jUDDI uses several classes related to Java’s Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.

References

  • github.com/advisories/GHSA-9hx8-2mrv-r674
  • github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f
  • nvd.nist.gov/vuln/detail/CVE-2021-37578

Code Behaviors & Features

Detect and mitigate CVE-2021-37578 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.3.10

Fixed versions

  • 3.3.10

Solution

Upgrade to version 3.3.10 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

maven/org.apache.juddi/juddi-core/CVE-2021-37578.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.