GHSA-JMW5-58C7-587H
Vulnerability from github – Published: 2026-01-26 12:30 – Updated: 2026-01-26 23:43
VLAI?
Summary
Apache Karaf Decanter has Deserialization of Untrusted Data in its Log Socket Collector
Details
Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter.
The Decanter Log Socket Collector exposes port 4560 without authentication. If the collector exposes allowed classes property, this configuration can be bypassed. The Log Socket Collector is vulnerable to deserialization of untrusted data, eventually causing DoS.
NB: Decanter Log Socket Collector is not installed by default. Users who have not installed the Decanter Log Socket are not impacted by this issue.
This issue affects Apache Karaf Decanter before 2.12.0.
Users are recommended to upgrade to version 2.12.0, which fixes the issue.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.karaf.decanter.collector:org.apache.karaf.decanter.collector.log.socket"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.12.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-24656"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2026-01-26T23:43:29Z",
"nvd_published_at": "2026-01-26T10:16:09Z",
"severity": "LOW"
},
"details": "Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter.\n\nThe Decanter Log Socket Collector exposes port 4560 without authentication. If the collector exposes allowed classes property, this configuration can be bypassed. The Log Socket Collector is vulnerable to deserialization of untrusted data, eventually causing DoS.\n\nNB: Decanter Log Socket Collector is not installed by default. Users who have not installed the Decanter Log Socket are not impacted by this issue.\n\nThis issue affects Apache Karaf Decanter before 2.12.0.\n\nUsers are recommended to upgrade to version 2.12.0, which fixes the issue.",
"id": "GHSA-jmw5-58c7-587h",
"modified": "2026-01-26T23:43:29Z",
"published": "2026-01-26T12:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24656"
},
{
"type": "WEB",
"url": "https://github.com/apache/karaf-decanter/issues/555"
},
{
"type": "WEB",
"url": "https://github.com/apache/karaf-decanter/commit/9d7058d37160a16aaad34b488170adf277351e8b"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/karaf-decanter"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/dc5wmdn6hyc992olntkl75kk04ndzx34"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/01/24/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
],
"summary": "Apache Karaf Decanter has Deserialization of Untrusted Data in its Log Socket Collector"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…