Rewterz
DarkCrystal RAT aka DCRat – Active IOCs
January 17, 2025
Rewterz
CVE-2024-12802 – SonicWall SSL-VPN Vulnerability
January 17, 2025

Multiple Apache Products Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2025-22828 CVSS:4.3

Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource UUIDs can list and add comments (annotations) to such resources.

CVE-2024-54676 CVSS:9.8

Default clustering instructions at https://openmeetings.apache.org/Clustering.html doesn't specify white/black lists for OpenJPA this leads to possible deserialisation of untrusted data. Users are recommended to upgrade to version 8.0.0 and update their startup scripts to include the relevant 'openjpa.serialization.class.blacklist' and 'openjpa.serialization.class.whitelist' configurations as shown in the documentation.

CVE-2024-45627 CVSS:5.9

In Apache Linkis <1.7.0, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will allow the attacker to read arbitrary files from the Linkis server. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis < 1.7.0 will be affected. We recommend users upgrade the version of Linkis to version 1.7.0.

Impact

  • Gain Access
  • Security Bypass

Indicators of Compromise

CVE

  • CVE-2025-22828

  • CVE-2024-54676

  • CVE-2024-45627

Affected Vendors

Apache

Affected Products

  • Apache CloudStack 4.16.0
  • Apache OpenMeetings 2.1.0 - 8.0.0
  • Apache Linkis 1.7.0

Remediation

Refer to Apache Website for patch, upgrade, or suggested workaround information.

CVE-2025-22828

CVE-2024-54676

CVE-2024-45627