CVE-2017-20189

critical

Description

In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.

References

https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378

https://github.com/frohoff/ysoserial/pull/68/files

https://github.com/clojure/clojure/commit/271674c9b484d798484d134a5ac40a6df15d3ac3

Details

Source: Mitre, NVD

Published: 2024-01-22

Updated: 2025-05-30

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.02238