Description
A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
Remediation
References
https://access.redhat.com/errata/RHSA-2022:6813
https://access.redhat.com/security/cve/CVE-2022-1415
https://bugzilla.redhat.com/show_bug.cgi?id=2065505
Related Vulnerabilities
CVE-2015-5345 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2009-2625 Vulnerability in maven package xerces:xercesimpl
CVE-2022-45399 Vulnerability in maven package org.zeroturnaround:cluster-stats
CVE-2020-12480 Vulnerability in maven package com.typesafe.play:play_2.11
CVE-2022-31679 Vulnerability in maven package org.springframework.data:spring-data-rest-webmvc