Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-36944

EPSS 67.81% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-36944

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Scala 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Scala是Scala开源的一个 Scala 2 编译器和标准库。 Scala 2.13.9之前的2.13.x版本存在代码问题漏洞,该漏洞源于JAR文件中有一个Java反序列化链,它不能被利用,与应用程序中的LazyList对象反序列化一起存在风险。在这种情况下,它允许攻击者擦除任意文件的内容,建立网络连接,或者可能通过小工具链运行任意代码(特别是 Function0 函数)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-36944

#POC DescriptionSource LinkShenlong Link
1POC for the CVE-2022-36944 vulnerability exploithttps://github.com/yarocher/lazylist-cve-pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-36944

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-09-23 · 79 CVEs total

CVE-2022-35246Rocket.Chat 安全漏洞
CVE-2022-35248Rocket.Chat 授权问题漏洞
CVE-2022-32220Rocket.Chat 信息泄露漏洞
CVE-2022-35250Rocket.Chat 安全漏洞
CVE-2022-35251Rocket.Chat 跨站脚本漏洞
CVE-2022-35249Rocket.Chat 信息泄露漏洞
CVE-2022-35893Insyde InsydeH2O 输入验证错误漏洞
CVE-2022-40359Google KFM 跨站脚本漏洞
CVE-2022-40358Pydio 跨站脚本漏洞
CVE-2022-36338Insyde InsydeH2O 安全漏洞
CVE-2022-32218Rocket.Chat 信息泄露漏洞
CVE-2022-32226Rocket.Chat 输入验证错误漏洞
CVE-2022-32227Rocket.Chat 信息泄露漏洞
CVE-2022-32228Rocket.Chat 安全漏洞
CVE-2022-32229Rocket.Chat 安全漏洞
CVE-2022-35247Rocket.Chat 安全漏洞
CVE-2022-30124Rocket.Chat 授权问题漏洞
CVE-2022-32211Rocket.Chat SQL注入漏洞
CVE-2022-32217Rocket.Chat 日志信息泄露漏洞
CVE-2022-32219Rocket.Chat 信息泄露漏洞

Showing top 20 of 79 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-36944

No comments yet


Leave a comment