You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@flex.apache.org by "Christofer Dutz (JIRA)" <ji...@apache.org> on 2017/04/03 08:33:41 UTC

[jira] [Resolved] (FLEX-35290) Deserialization of Untrusted Data via Externalizable.readExternal

     [ https://issues.apache.org/jira/browse/FLEX-35290?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Christofer Dutz resolved FLEX-35290.
------------------------------------
       Resolution: Fixed
         Assignee: Christofer Dutz
    Fix Version/s: Apache BlazeDS 4.7.3

> Deserialization of Untrusted Data via Externalizable.readExternal
> -----------------------------------------------------------------
>
>                 Key: FLEX-35290
>                 URL: https://issues.apache.org/jira/browse/FLEX-35290
>             Project: Apache Flex
>          Issue Type: Bug
>          Components: BlazeDS
>    Affects Versions: BlazeDS 4.7.2
>            Reporter: Markus Wulftange
>            Assignee: Christofer Dutz
>            Priority: Critical
>              Labels: security
>             Fix For: Apache BlazeDS 4.7.3
>
>
> The AMF deserialization implementation of Flex BlazeDS is vulnerable to Deserialization of Untrusted Data via {{Externalizable.readExternal(ObjectInput)}}.
> By sending a specially crafted AMF message, it is possible to make the server establish a connection to an endpoint specified in the message and request an RMI remote object from that endpoint. This can result in the execution of arbitrary code on the server via Java deserialization.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)