Am 01.04.2017 um 08:20 schrieb Fabrice Dagorn:
> The POC is a simple Eclipse java project.
>
> UnsafeReceiver will open a ServerSocketReceiver on port and wait
> forever.
>
> Injector will then open a client Socket to the ServerSocketReceiver and
> serialize a Calculator instance through the
The POC is a simple Eclipse java project.
UnsafeReceiver will open a ServerSocketReceiver on port and wait
forever.
Injector will then open a client Socket to the ServerSocketReceiver and
serialize a Calculator instance through the wire.
Calculator implements ILoggingEvent to prevent C
Am 31.03.2017 um 08:10 schrieb Fabrice Dagorn:
> Hi,
> I have made a quick and dirty POC for this issue.
> This results in a remote code execution in the JVM that exposes a
> ServerSocketReceiver.
>
> Unfortunately, logback 1:1.1.9-2 is still vulnerable, not 1.2.x.
>
> The POC is available on de
You could also attach the POC to this bug report. The vulnerability is
publicly known by now anyway.
Markus
signature.asc
Description: OpenPGP digital signature
Hi,
I have made a quick and dirty POC for this issue.
This results in a remote code execution in the JVM that exposes a
ServerSocketReceiver.
Unfortunately, logback 1:1.1.9-2 is still vulnerable, not 1.2.x.
The POC is available on demand.
Regards,
Fabrice Dagorn
Processing control commands:
> reopen -1
Bug #857343 {Done: Markus Koschany } [liblogback-java]
logback: CVE-2017-5929: serialization vulnerability affecting the SocketServer
and ServerSocketReceiver components
Bug #858914 {Done: Markus Koschany } [liblogback-java]
CVE-2017-5929: serialization
Control: reopen -1
Am 29.03.2017 um 08:11 schrieb Fabrice Dagorn:
> Thank you for your upload.
>
> But i think that the issue is not completely solved, upstream made it in
> several commits (https://github.com/qos-ch/logback/commits/v_1.2.0).
>
> The comment is not meaningful but this one is rel
Thank you for your upload.
But i think that the issue is not completely solved, upstream made it in
several commits (https://github.com/qos-ch/logback/commits/v_1.2.0).
The comment is not meaningful but this one is related to the
vulnerability :
https://github.com/qos-ch/logback/commit/979b0
8 matches
Mail list logo