Article Details

Scrape Timestamp (UTC): 2024-10-07 09:33:56.640

Source: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html

Original Article Text

Click to Toggle View

Critical Apache Avro SDK Flaw Allows Remote Code Execution in Java Applications. A critical security flaw has been disclosed in the Apache Avro Java Software Development Kit (SDK) that, if successfully exploited, could allow the execution of arbitrary code on susceptible instances. The flaw, tracked as CVE-2024-47561, impacts all versions of the software prior to 1.11.4. "Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code," the project maintainers said in an advisory released last week. "Users are recommended to upgrade to version 1.11.4 or 1.12.0, which fix this issue." Apache Avro, analogous to Google's Protocol Buffers (protobuf), is an open-source project that provides a language-neutral data serialization framework for large-scale data processing. The Avro team notes that the vulnerability affects any application if it allows users to provide their own Avro schemas for parsing. Kostya Kortchinsky from the Databricks security team has been credited with discovering and reporting the security shortcoming. As mitigations, it's recommended to sanitize schemas before parsing them and avoid parsing user-provided schemas. "CVE-2024-47561 affects Apache Avro 1.11.3 and previous versions while de-serializing input received via avroAvro schema," Mayuresh Dani, Manager, manager of threat research at Qualys, said in a statement shared with The Hacker News. "Processing such input from a threat actor leads to execution of code. Based on our threat intelligence reporting, no PoC is publicly available, but this vulnerability exists while processing packages via ReflectData and SpecificData directives and can also be exploited via Kafka." "Since Apache Avro is an open-source project, it is used by many organizations. Based on publicly available data, a majority of these organizations are located in the US. This definitely has a lot of security implications if left unpatched, unsupervised and unprotected."

Daily Brief Summary

MALWARE // Critical Security Flaw in Apache Avro Java SDK Exposes Risks

A severe vulnerability has been identified in the Apache Avro Java SDK, detailed as CVE-2024-47561, impacting all versions prior to 1.11.4.

The flaw permits remote code execution if attackers exploit configurations allowing user-defined Avro schema parsing.

Users are advised to promptly upgrade to Apache Avro versions 1.11.4 or 1.12.0, where the issue has been resolved.

Kostya Kortchinsky of the Databricks security team discovered this vulnerability, highlighting the serious threat posed by unsanitized schema parsing.

Mitigation strategies include the sanitation of schemas before parsing and the avoidance of parsing schemas provided by users.

Mayuresh Dani from Qualys emphasized the risk, noting no publicly available PoC but potential exploits via ReflectData and SpecificData in package processing.

The widespread usage of Apache Avro, especially in U.S. organizations, underscores the critical need for timely updates to prevent unauthorized code execution.