This is an automated email from the ASF dual-hosted git repository.

albumenj pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/dubbo-spi-extensions.git


The following commit(s) were added to refs/heads/master by this push:
     new 12502f2  Explicitly call out hessian-rpc is unstafe by default (#196)
12502f2 is described below

commit 12502f2a5222d3013c7ba8718fe604a80ab57d03
Author: Arnout Engelen <[email protected]>
AuthorDate: Mon Mar 13 12:55:37 2023 +0100

    Explicitly call out hessian-rpc is unstafe by default (#196)
---
 dubbo-rpc-extensions/dubbo-rpc-hessian/README.md | 14 ++++++++++++++
 1 file changed, 14 insertions(+)

diff --git a/dubbo-rpc-extensions/dubbo-rpc-hessian/README.md 
b/dubbo-rpc-extensions/dubbo-rpc-hessian/README.md
new file mode 100644
index 0000000..e1a6465
--- /dev/null
+++ b/dubbo-rpc-extensions/dubbo-rpc-hessian/README.md
@@ -0,0 +1,14 @@
+# dubbo-rpc-hessian
+
+## Security
+
+Warning: by default, anyone who can provide data to the Hessian deserializer
+can cause it to run arbitrary code.
+
+For that reason, if you enable the dubbo-rpc-hessian component, you must make
+sure your deployment is only reachable by trusted parties, and/or configure
+a serialization whitelist. Unfortunately we don't currently have any
+documentation on how to configure a serialization whitelist.
+
+For more general information on how to deal with deserialization security,
+see [this 
page](https://dubbo.apache.org/en/docs/notices/security/#some-suggestions-to-deal-with-the-security-vulnerability-of-deserialization)

Reply via email to