You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@ofbiz.apache.org by "Jacques Le Roux (Jira)" <ji...@apache.org> on 2022/03/28 11:49:00 UTC

[jira] [Updated] (OFBIZ-12592) Prevent possible DOS attack done using Java deserialisation

     [ https://issues.apache.org/jira/browse/OFBIZ-12592?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Jacques Le Roux updated OFBIZ-12592:
------------------------------------
        Parent: OFBIZ-1525
    Issue Type: Sub-task  (was: Improvement)

> Prevent possible DOS attack done using Java deserialisation
> -----------------------------------------------------------
>
>                 Key: OFBIZ-12592
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-12592
>             Project: OFBiz
>          Issue Type: Sub-task
>          Components: ALL COMPONENTS
>    Affects Versions: 18.12.06, 22.01.01
>            Reporter: Jacques Le Roux
>            Assignee: Jacques Le Roux
>            Priority: Major
>
> Qing Xu, a security reporter, alerted us that, despite no current vulnerability, it could be maybe possible to do  DOS attacks using Java deserialisation. That has been fixed with https://openjdk.java.net/jeps/290 and even [implemented in Java 8|https://blogs.oracle.com/java/post/filter-incoming-serialization-data-a-little-of-jdk-9-goodness-available-now-in-current-release-families], but it needs a little effort on our side.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)