脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Jackson Configuration Allows Code Execution with Unknown "Serialization Gadgets"
脆弱性説明
When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown "deserialization gadgets" when enabling default typing.
CVSS情報
N/A
脆弱性タイプ
可信数据的反序列化
脆弱性タイトル
VMware Spring Batch 代码问题漏洞
脆弱性説明
VMware Spring Batch是美国威睿(VMware)公司的一款用于大量数据并行处理的轻量级框架。 VMware Spring Batch 4.0.0版本至4.0.4版本、4.1.0版本至4.1.4版本和4.2.0版本至4.2.2版本中的Jackson配置存在代码问题漏洞。攻击者可利用该漏洞执行任意代码。
CVSS情報
N/A
脆弱性タイプ
N/A