CVE-2024-6875

6.5 MEDIUM

📋 TL;DR

This vulnerability in Infinispan's REST compare API allows attackers to cause a buffer leak and out-of-memory errors by sending continuous requests with large POST data. This affects Red Hat Data Grid deployments using the vulnerable REST API component. The vulnerability can lead to denial of service conditions.

💻 Affected Systems

Products:
  • Red Hat Data Grid
  • Infinispan
Versions: Red Hat Data Grid 8.x versions before the fix
Operating Systems: All platforms running affected Infinispan/Data Grid versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the REST compare API endpoint. The vulnerability is present in default configurations when this API is enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage due to out-of-memory errors causing the Infinispan instance to crash, potentially affecting dependent applications and data availability.

🟠

Likely Case

Degraded performance and intermittent service disruptions as memory resources are exhausted, requiring manual intervention to restart services.

🟢

If Mitigated

Minimal impact with proper rate limiting, request size limits, and monitoring in place to detect abnormal request patterns.

🌐 Internet-Facing: HIGH if REST API is exposed to untrusted networks, as attackers can easily send malicious requests without authentication.
🏢 Internal Only: MEDIUM as internal attackers or compromised internal systems could still exploit this to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending continuous large POST requests to the REST compare API endpoint, which is straightforward to automate.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat advisory for specific fixed versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-6875

Restart Required: Yes

Instructions:

1. Review Red Hat advisory for exact fixed version. 2. Update Red Hat Data Grid to patched version. 3. Restart Infinispan services. 4. Verify fix by checking version and monitoring for memory issues.

🔧 Temporary Workarounds

Disable REST compare API

all

Disable the vulnerable REST compare API endpoint if not required

Modify Infinispan configuration to disable REST compare API endpoint

Implement request size limits

all

Configure web server or application firewall to limit POST request sizes

Configure request size limits in reverse proxy (e.g., nginx: client_max_body_size) or application firewall

🧯 If You Can't Patch

  • Implement strict rate limiting on REST API endpoints
  • Deploy web application firewall with request size and rate limiting rules

🔍 How to Verify

Check if Vulnerable:

Check if running affected Red Hat Data Grid version with REST API enabled. Review configuration for REST compare API endpoint availability.

Check Version:

Check Data Grid/Infinispan version through management console or version API endpoint

Verify Fix Applied:

Verify updated to patched version and monitor memory usage during normal REST API operations.

📡 Detection & Monitoring

Log Indicators:

  • High memory usage alerts
  • OutOfMemoryError in logs
  • Unusually large POST requests to REST compare endpoint
  • Frequent garbage collection events

Network Indicators:

  • High volume of large POST requests to REST API
  • Abnormal request patterns to /rest/v2/cache/*/compare endpoint

SIEM Query:

source="infinispan" AND ("OutOfMemoryError" OR "java.lang.OutOfMemoryError") OR (http_method="POST" AND uri_path="/rest/v2/cache/*/compare" AND content_length>threshold)

🔗 References

📤 Share & Export