I'd like to find out some more details about the specific vulnerability
motivations behind the whitelist fix for the java deserialization issue. I'd
like to disambiguate between the addition of the feature for the whitelist
and the specific java deserialization exploit vectors using the gadget
chains.

My main goal is to determine whether activemq has any inherent  exploitable
deserialization gadget outside of commons collections. 

In other words, the whitelist is a precaution and good proactive security,
but the real 'fix' is the updated dependency. There were no changes to any
API for activemq that could have been leveraged as a gadget, correct?

The implications are that it is minimally sufficient to remediate the
commons-collections library alone with a * whitelist for the current
releases, and for older releases to just update the commons-collections
library. The latter would not provide the safety net the white list provides
but would remediate the immediate danger.

Is my assessment correct? 


1.  ActiveMQ contains a dependency on the known vulnerable library -
commons-collections

The commit for 5.12.2 updates the depedency on commons collections, so
definitely that is a gadget vector for exploit. 

https://git-wip-us.apache.org/repos/asf?p=activemq.git;a=commit;h=81ef5efdc749d9af2fc4150f92195132b1298423





--
View this message in context: 
http://activemq.2283324.n4.nabble.com/java-deserialization-vulnerability-details-for-activemq-tp4709176.html
Sent from the ActiveMQ - User mailing list archive at Nabble.com.

Reply via email to