Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
References
Link | Resource |
---|---|
https://www.scala-lang.org/download/ | Vendor Advisory |
https://github.com/scala/scala/pull/10118 | Exploit Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3WMKPFAMFQE3HJVRQ5KOJUTWG264SXI/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ZOZVWY3X72FZZCCRAKRJYTQOJ6LUD6Z/ | Mailing List Third Party Advisory |
https://discuss.lightbend.com/t/impact-of-cve-2022-36944-on-akka-cluster-akka-actor-akka-remote/10007/2 | Third Party Advisory |
https://github.com/scala/scala-collection-compat/releases/tag/v2.9.0 | Release Notes Third Party Advisory |
Information
Published : 2022-09-23 11:15
Updated : 2023-02-03 11:05
NVD link : CVE-2022-36944
Mitre link : CVE-2022-36944
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
scala-lang
- scala
fedoraproject
- fedora