VYPR
High severityNVD Advisory· Published Jan 10, 2018· Updated Sep 16, 2024

CVE-2017-9795

CVE-2017-9795

Description

When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Apache Geode prior to 1.3.0, a user with read access to certain regions can use OQL to access unauthorized regions and potentially achieve remote code execution.

Vulnerability

In Apache Geode clusters running in secure mode before version 1.3.0, the Object Query Language (OQL) execution engine does not properly enforce region-level authorization. A user granted read access to specific regions can craft OQL queries that read or write objects in unauthorized regions. Additionally, the flawed OQL processing can allow method invocation that leads to remote code execution [1]. The issue is tracked as GEODE-3247 [2].

Exploitation

An attacker must have valid credentials for an Apache Geode cluster operating in secure mode and must possess at least read access to one or more regions. Using that access, the attacker sends specially crafted OQL queries that bypass region authorization checks. The queries can both access data outside the user’s intended scope and, due to insecure method invocation during query evaluation, execute arbitrary code on the server [1][2].

Impact

A successful exploit permits an authenticated attacker to read and write data in unauthorized regions, violating confidentiality and integrity. More critically, the same attack vector can yield full remote code execution (RCE) on the Geode server, giving the attacker the ability to run arbitrary commands with the privileges of the Geode process [1].

Mitigation

Upgrade to Apache Geode 1.3.0 or later, which includes the fix for OQL authorization enforcement and method invocation restrictions [2]. No workaround is available for earlier versions. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog as of the publication date.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.geode:geode-coreMaven
>= 1.0.0, < 1.3.01.3.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.