Description
Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator.

This issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016.

An attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access.


Users are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue.
Published: 2024-10-31
Score: 8 High
EPSS: 4.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2909 Apache Lucene.Net.Replicator Deserialization of Untrusted Data vulnerability
Github GHSA Github GHSA GHSA-2qw8-ppr5-m96c Apache Lucene.Net.Replicator Deserialization of Untrusted Data vulnerability
History

Tue, 11 Feb 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache lucene.net
CPEs cpe:2.3:a:apache:lucene.net:4.8.0:beta00005:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00006:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00007:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00008:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00009:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00010:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00011:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00012:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00013:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00014:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00015:*:*:*:*:*:*
cpe:2.3:a:apache:lucene.net:4.8.0:beta00016:*:*:*:*:*:*
Vendors & Products Apache lucene.net

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Thu, 31 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache lucene
CPEs cpe:2.3:a:apache:lucene:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache lucene
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 31 Oct 2024 10:15:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator. This issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016. An attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access. Users are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue.
Title Apache Lucene.Net.Replicator: Remote Code Execution in Lucene.Net.Replicator
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Apache Lucene Lucene.net
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-10-31T13:52:47.181Z

Reserved: 2024-08-10T16:38:34.946Z

Link: CVE-2024-43383

cve-icon Vulnrichment

Updated: 2024-10-31T10:03:23.483Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-31T10:15:04.293

Modified: 2025-02-11T16:13:52.167

Link: CVE-2024-43383

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses