A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=2065505 | Issue Tracking Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2022:6813 | Vendor Advisory |
| https://access.redhat.com/security/cve/CVE-2022-1415 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 03:41
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-09-11 21:15
Updated : 2024-05-03 16:15
NVD link : CVE-2022-1415
Mitre link : CVE-2022-1415
JSON object : View
Products Affected
redhat
- drools
- jboss_middleware_text-only_advisories
- process_automation
- decision_manager
CWE
CWE-502
Deserialization of Untrusted Data
