• 公告ID (KylinSec-SA-2022-2368)

摘要:

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with LazyList object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

安全等级: Low

公告ID: KylinSec-SA-2022-2368

发布日期: 2022年9月30日

关联CVE: CVE-2022-36944  

  • 详细介绍

1. 漏洞描述

   

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with LazyList object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-36944 KY3.4-4A scala Unaffected
CVE-2022-36944 KY3.4-5 scala Unaffected
CVE-2022-36944 KY3.5.1 scala Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-2364 下一篇:KylinSec-SA-2022-2369