The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization

Brocade SANnav

0 more products

22450

29 August 2023

29 August 2023

CLOSED

MEDIUM

7.7 HIGH - Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H

CVE-2022-25647

Brocade Security Advisory ID

BSA-2023-1972

Component

gson

 

 

Summary

The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.

 

Products Affected

Brocade SANnav versions after v2.2.0 and prior to v2.2.2a are affected

 

Products Confirmed Not Affected

Brocade Fabric OS and Brocade ASCG are not affected by this vulnerability

 

Solution

Solution provided in Brocade SANnav v2.2.2a, Brocade v2.3.0 and later versions to upgrade all directly used open source objects that are accessible to users to versions that no longer contain the vulnerable method.  

Open source components that contain the vulnerable method remain within the Brocade SANnav product, however these modules are used by other open source objects and the vulnerable module is not accessible to the user via wrappers and APIs that prevent access to the vulnerable module.   Brocade SANnav v2.2.2a, v2.3.0 and later versions are not vulnerable due to VEX code: Inline_mitigations_already_exist

 

 

Revision History

Version

Change

Date

1.0

Initial Publication

August 29, 2023

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.