Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Object Deserialisation Vulnerability in ObjectStreamConnection.java #1162

Closed
prodigysml opened this issue Sep 29, 2018 · 2 comments
Closed
Labels

Comments

@prodigysml
Copy link

The Issue

Object Deserialization Injection attacks utilise overly trusted user-controlled input, passed to deserialisation functions. The deserialisation of objects can trigger certain methods within the object, allowing the attacker to perform unauthorised actions like execution of code, disclosure of information, etc.

Where the Issue Occurred

Displayed below is the code within the project, where the user input is passed into the deserialisation function:

packet = (NetworkPacket) in.readObject();

The above code can be manipulated by specially crafted network packets.

@NicoleG25
Copy link

Hi, do you plan to address this vulnerability? :)
Note that it appears CVE-2018-1000824 was assigned to this issue.

@neoancient
Copy link
Member

This was never an actual problem because that code was never actually used, and that class was removed in 36ebf84.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants