Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Oracle
Subscribe
|
Banking Corporate Lending Process Management
Subscribe
Banking Credit Facilities Process Management
Subscribe
Banking Supply Chain Finance
Subscribe
Banking Virtual Account Management
Subscribe
Flexcube Private Banking
Subscribe
Retail Customer Management And Segmentation Foundation
Subscribe
Retail Merchandising System
Subscribe
|
|
Vmware
Subscribe
|
Spring Integration
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0604 | Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code. |
Github GHSA |
GHSA-86qr-9vqc-pgc6 | Code execution in Spring Integration |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: pivotal
Published:
Updated: 2024-09-16T16:22:53.854Z
Reserved: 2020-01-03T00:00:00
Link: CVE-2020-5413
No data.
Status : Modified
Published: 2020-07-31T20:15:13.017
Modified: 2024-11-21T05:34:07.263
Link: CVE-2020-5413
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA