Uploaded image for project: 'Apache Flex'
  1. Apache Flex
  2. FLEX-35290

Deserialization of Untrusted Data via Externalizable.readExternal

Attach filesAttach ScreenshotVotersWatch issueWatchersCreate sub-taskLinkCloneUpdate Comment AuthorReplace String in CommentUpdate Comment VisibilityDelete Comments
    XMLWordPrintableJSON

Details

    • Important

    Description

      The AMF deserialization implementation of Flex BlazeDS is vulnerable to Deserialization of Untrusted Data via Externalizable.readExternal(ObjectInput).

      By sending a specially crafted AMF message, it is possible to make the server establish a connection to an endpoint specified in the message and request an RMI remote object from that endpoint. This can result in the execution of arbitrary code on the server via Java deserialization.

      Attachments

        Activity

          This comment will be Viewable by All Users Viewable by All Users
          Cancel

          People

            cdutz Christofer Dutz
            markus.wulftange@code-white.com Markus Wulftange
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Slack

                Issue deployment