CVE-2024-52577

In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.
References
Link Resource
https://lists.apache.org/thread/1bst0n27m9kb3b6f6hvlghn182vqb2hh Mailing List Vendor Advisory Issue Tracking
http://www.openwall.com/lists/oss-security/2025/02/14/2 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:ignite:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-02-14 10:15

Updated : 2025-07-14 14:08


NVD link : CVE-2024-52577

Mitre link : CVE-2024-52577

CVE.ORG link : CVE-2024-52577


JSON object : View

Products Affected

apache

  • ignite
CWE
CWE-502

Deserialization of Untrusted Data