CVE-2017-20189

In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.
Configurations

Configuration 1 (hide)

cpe:2.3:a:clojure:clojure:*:*:*:*:*:*:*:*

History

30 Jan 2024, 23:01

Type Values Removed Values Added
CPE cpe:2.3:a:clojure:clojure:*:*:*:*:*:*:*:*
CWE CWE-502
References () https://clojure.atlassian.net/browse/CLJ-2204 - () https://clojure.atlassian.net/browse/CLJ-2204 - Exploit, Patch, Vendor Advisory
References () https://github.com/clojure/clojure/commit/271674c9b484d798484d134a5ac40a6df15d3ac3 - () https://github.com/clojure/clojure/commit/271674c9b484d798484d134a5ac40a6df15d3ac3 - Patch
References () https://github.com/frohoff/ysoserial/pull/68/files - () https://github.com/frohoff/ysoserial/pull/68/files - Patch
References () https://hackmd.io/%40fe1w0/HyefvRQKp - () https://hackmd.io/%40fe1w0/HyefvRQKp - Exploit, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378 - () https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378 - Patch, Third Party Advisory
First Time Clojure
Clojure clojure
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

22 Jan 2024, 14:01

Type Values Removed Values Added
Summary
  • (es) En Clojure anterior a 1.9.0, las clases se pueden usar para construir un objeto serializado que ejecuta código arbitrario tras la deserialización. Esto es relevante si un servidor deserializa objetos que no son de confianza.

22 Jan 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-22 06:15

Updated : 2024-01-30 23:01


NVD link : CVE-2017-20189

Mitre link : CVE-2017-20189

CVE.ORG link : CVE-2017-20189


JSON object : View

Products Affected

clojure

  • clojure
CWE
CWE-502

Deserialization of Untrusted Data