#VU59173 Improper neutralization of special elements in output used by a downstream component in Apache Geode


Published: 2022-01-04

Vulnerability identifier: #VU59173

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-34797

CWE-ID: CWE-74

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Apache Geode
Server applications / Other server solutions

Vendor: Apache Foundation

Description

The vulnerability allows a remote user to alter log files.

The vulnerability exists due to improper input validation when parsing values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". A remote user can inject specially crafted characters into log files and alter them, hiding initial information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Apache Geode: 1.13.0 - 1.13.4, 1.12.0 - 1.12.4


External links
http://seclists.org/oss-sec/2022/q1/0


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability