漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
dd-trace-java: Unsafe deserialization in RMI instrumentation may lead to remote code execution
Vulnerability Description
dd-trace-java is a Datadog APM client for Java. In versions of dd-trace-java 0.40.0 through prior to 1.60.2, the RMI instrumentation registered a custom endpoint that deserialized incoming data without applying serialization filters. On JDK version 16 and earlier, an attacker with network access to a JMX or RMI port on an instrumented JVM could exploit this to potentially achieve remote code execution. All three of the following conditions must be true to exploit this vulnerability: First, dd-trace-java is attached as a Java agent (`-javaagent`) on Java 16 or earlier. Second, a JMX/RMI port has been explicitly configured via `-Dcom.sun.management.jmxremote.port` and is network-reachable, Third, a gadget-chain-compatible library is present on the classpath. For JDK >= 17, no action is required, but upgrading is strongly encouraged. For JDK >= 8u121 < JDK 17, upgrade to dd-trace-java version 1.60.3 or later. For JDK < 8u121 and earlier where serialization filters are not available, apply the workaround. The workaround is to set the following environment variable to disable the RMI integration: `DD_INTEGRATION_RMI_ENABLED=false`.
CVSS Information
N/A
Vulnerability Type
可信数据的反序列化
Vulnerability Title
Datadog Java APM 代码问题漏洞
Vulnerability Description
Datadog Java APM是Datadog, Inc.开源的一个Java应用性能监控与追踪库。 Datadog Java APM 1.60.2之前版本存在代码问题漏洞,该漏洞源于RMI工具注册的自定义端点反序列化数据时未应用序列化过滤器,可能导致远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A