David Jorm created CAMEL-7322:
---------------------------------

             Summary: Routes using serialized data formats could expose 
security issues
                 Key: CAMEL-7322
                 URL: https://issues.apache.org/jira/browse/CAMEL-7322
             Project: Camel
          Issue Type: New Feature
          Components: documentation
    Affects Versions: 2.13.0
            Reporter: David Jorm


Camel supports various serialized data formats. Camel routes using these data 
formats could expose security issues if vulnerable classes are on the 
classpath. For example, CVE-2013-2186 describes a poison null byte flaw that 
existed in Apache Commons FileUpload:

http://svn.apache.org/viewvc?view=revision&revision=1507048

If an application was exposing Camel routes that used serialized data formats, 
and had a vulnerable class such as Commons FileUpload on the classpath, it 
could be exploited, as an attacker would be able to call the deserialization 
methods on that class.

Camel could address this by exposing a configuration mechanism for 
type-checking data prior to deserialization, using a technique such as:

http://www.ibm.com/developerworks/java/library/se-lookahead/index.html

And then providing documentation warning users against deserializing arbitrary 
user-supplied content. Alternatively, this could be conisidered a problem to be 
solved by applications exposing Camel routes that use serialized data formats, 
and therefore be addressed entirely in documentation. If the latter approach is 
taken, then I am happy to provide draft documentation content.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to