The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization
22450
29 August 2023
29 August 2023
CLOSED
MEDIUM
7.7 HIGH - Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
CVE-2022-25647
Brocade Security Advisory ID |
BSA-2023-1972 |
Component |
gson |
|
|
Summary
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
Products Affected
Brocade SANnav versions after v2.2.0 and prior to v2.2.2a are affected
Products Confirmed Not Affected
Brocade Fabric OS and Brocade ASCG are not affected by this vulnerability
Solution
Solution provided in Brocade SANnav v2.2.2a, Brocade v2.3.0 and later versions to upgrade all directly used open source objects that are accessible to users to versions that no longer contain the vulnerable method.
Open source components that contain the vulnerable method remain within the Brocade SANnav product, however these modules are used by other open source objects and the vulnerable module is not accessible to the user via wrappers and APIs that prevent access to the vulnerable module. Brocade SANnav v2.2.2a, v2.3.0 and later versions are not vulnerable due to VEX code: Inline_mitigations_already_exist
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
August 29, 2023 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.