CVE-2024-56180: Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution

9.8 CVSS

Description

CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.

Classification

CVE ID: CVE-2024-56180

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products

Vendor: Apache Software Foundation

Product: Apache EventMesh

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.99% (scored less or equal to compared to others)

EPSS Date: 2025-03-15 (when was this score calculated)

References

https://lists.apache.org/thread/k9fw0t5r7t1vbx53gs8d1r8c54rhx0wd

Timeline