You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@ofbiz.apache.org by "Jacques Le Roux (Jira)" <ji...@apache.org> on 2022/03/28 11:49:00 UTC
[jira] [Updated] (OFBIZ-12592) Prevent possible DOS attack done using Java deserialisation
[ https://issues.apache.org/jira/browse/OFBIZ-12592?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Jacques Le Roux updated OFBIZ-12592:
------------------------------------
Parent: OFBIZ-1525
Issue Type: Sub-task (was: Improvement)
> Prevent possible DOS attack done using Java deserialisation
> -----------------------------------------------------------
>
> Key: OFBIZ-12592
> URL: https://issues.apache.org/jira/browse/OFBIZ-12592
> Project: OFBiz
> Issue Type: Sub-task
> Components: ALL COMPONENTS
> Affects Versions: 18.12.06, 22.01.01
> Reporter: Jacques Le Roux
> Assignee: Jacques Le Roux
> Priority: Major
>
> Qing Xu, a security reporter, alerted us that, despite no current vulnerability, it could be maybe possible to do DOS attacks using Java deserialisation. That has been fixed with https://openjdk.java.net/jeps/290 and even [implemented in Java 8|https://blogs.oracle.com/java/post/filter-incoming-serialization-data-a-little-of-jdk-9-goodness-available-now-in-current-release-families], but it needs a little effort on our side.
--
This message was sent by Atlassian Jira
(v8.20.1#820001)