Hi everyone,

We use Java serialization and deserialization a lot in Iceberg. I wonder if
we have considered the potential of Java deserialization attack, where an
attacker can replace serialized bytes to execute arbitrary code through the
readObject method.

Currently our SerializationUtil.deserializeFromBytes directly converts
bytes to an ObjectInputStream. I know Apache commons have
ValidatingObjectInputStream which can prevent the issue to some extent.

Have we thought about this issue in the past? Are there any other
suggestions?

Best,
Jack Ye

Reply via email to