Unauthorized log files redaction in Apache Geode



Published: 2022-01-04
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-34797
CWE-ID CWE-74
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Apache Geode
Server applications / Other server solutions

Vendor Apache Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper neutralization of special elements in output used by a downstream component

EUVDB-ID: #VU59173

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-34797

CWE-ID: CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to alter log files.

The vulnerability exists due to improper input validation when parsing values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". A remote user can inject specially crafted characters into log files and alter them, hiding initial information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Apache Geode: 1.12.0 - 1.13.4

External links

http://seclists.org/oss-sec/2022/q1/0


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###