Code execution via deserialization in org.apache.ignite:ignite-core
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Oct 16, 2018 
          to the GitHub Advisory Database
          •
          Updated Mar 4, 2024 
      
  
Description
        Published to the GitHub Advisory Database
      Oct 16, 2018 
    
  
        Reviewed
      Jun 16, 2020 
    
  
        Last updated
      Mar 4, 2024 
    
  
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint.
References