[ 
https://issues.apache.org/jira/browse/FLEX-35290?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15953308#comment-15953308
 ] 

Markus Wulftange commented on FLEX-35290:
-----------------------------------------

[~cdutz] Good to hear that. You should update your download page 
<http://flex.apache.org/download-blazeds.html> accordingly.

> Deserialization of Untrusted Data via Externalizable.readExternal
> -----------------------------------------------------------------
>
>                 Key: FLEX-35290
>                 URL: https://issues.apache.org/jira/browse/FLEX-35290
>             Project: Apache Flex
>          Issue Type: Bug
>          Components: BlazeDS
>    Affects Versions: BlazeDS 4.7.2
>            Reporter: Markus Wulftange
>            Assignee: Christofer Dutz
>            Priority: Critical
>              Labels: security
>             Fix For: Apache BlazeDS 4.7.3
>
>
> The AMF deserialization implementation of Flex BlazeDS is vulnerable to 
> Deserialization of Untrusted Data via 
> {{Externalizable.readExternal(ObjectInput)}}.
> By sending a specially crafted AMF message, it is possible to make the server 
> establish a connection to an endpoint specified in the message and request an 
> RMI remote object from that endpoint. This can result in the execution of 
> arbitrary code on the server via Java deserialization.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to