|
|
Message-ID: <3f55d45c-12c3-7652-51bd-71290acf24e1@apache.org> Date: Sun, 12 Apr 2026 18:23:33 +0000 From: Richard Zowalla <rzo1@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-35337: Apache Storm Client: RCE through Unsafe Deserialization via Kerberos TGT Credential Handling Severity: important Affected versions: - Apache Storm Client (org.apache.storm:storm-client) before 2.8.6 Description: Deserialization of Untrusted Data vulnerability in Apache Storm. Versions Affected: before 2.8.6. Description: When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation. An authenticated user with topology submission rights could supply a crafted serialized object in the "TGT" credential field, leading to remote code execution in both the Nimbus and Worker JVMs. Mitigation: 2.x users should upgrade to 2.8.6. Users who cannot upgrade immediately should monkey-patch an ObjectInputFilter allow-list to ClientAuthUtils.deserializeKerberosTicket() restricting deserialized classes to javax.security.auth.kerberos.KerberosTicket and its known dependencies. A guide on how to do this is available in the release notes of 2.8.6. Credit: This issue was discovered by K. Credit: K (finder) References: https://storm.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-35337
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.