Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2024/VULN456 _____________________________________________________________________ DATE : 31/10/2024 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Apache Lucene.Net.Replicator versions prior to 4.8.0-beta00017. ===================================================================== https://lists.apache.org/thread/wlz1p76dxpt4rl9o29voxjd5zl7717nh _____________________________________________________________________ CVE-2024-43383: Apache Lucene.Net.Replicator: Remote Code Execution in Lucene.Net.Replicator Affected versions: - Apache Lucene.Net.Replicator 4.8.0-beta00005 through 4.8.0-beta00016 Description: Deserialization of Untrusted Data vulnerability in Apache Lucene.Net.Replicator. This issue affects Apache Lucene.NET's Replicator library: from 4.8.0-beta00005 through 4.8.0-beta00016. An attacker that can intercept traffic between a replication client and server, or control the target replication node URL, can provide a specially-crafted JSON response that is deserialized as an attacker-provided exception type. This can result in remote code execution or other potential unauthorized access. Users are recommended to upgrade to version 4.8.0-beta00017, which fixes the issue. Credit: Summ3r, Vidar-Team (reporter) Apache Lucene (remediation developer) References: https://lucenenet.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-43383 ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================