{"id":"CVE-2024-47561","details":"Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code.\nUsers are recommended to upgrade to version 1.11.4  or 1.12.0, which fix this issue.","aliases":["GHSA-r7pg-v2c8-mfg3"],"modified":"2026-03-14T12:40:05.892309Z","published":"2024-10-03T11:15:13.510Z","related":["CGA-62p4-r2v4-5ph8"],"references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/c2v7mhqnmq0jmbwxqq3r5jbj1xg43h5x"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2024/10/03/1"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20241011-0003/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/avro","events":[{"introduced":"0"},{"fixed":"6f119ef077e3a50382ba13164afecdf84408fc2f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.11.4"}]}}],"versions":["release-1.11.0","release-1.11.0-rc1","release-1.11.0-rc2","release-1.11.1","release-1.11.1-rc1","release-1.11.2","release-1.11.2-rc1","release-1.11.3","release-1.11.3-rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47561.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}