Description
A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
Remediation
References
https://bugzilla.redhat.com/show_bug.cgi?id=2065505
https://access.redhat.com/errata/RHSA-2022:6813
https://access.redhat.com/security/cve/CVE-2022-1415
Related Vulnerabilities
CVE-2023-4918 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2023-50768 Vulnerability in maven package org.sonatype.nexus.ci:nexus-jenkins-plugin
CVE-2020-28487 Vulnerability in maven package org.webjars.npm:vis-timeline
CVE-2021-3536 Vulnerability in maven package org.wildfly:wildfly-parent
CVE-2020-9488 Vulnerability in maven package org.apache.logging.log4j:log4j