[
https://issues.apache.org/jira/browse/FLEX-35290?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15953123#comment-15953123
]
Christofer Dutz commented on FLEX-35290:
----------------------------------------
This issue has been addressed by the BLazeDS version 4.7.3 which we released
last week. Starting with that version classes used for deserialization have to
be whitelisted.
> Deserialization of Untrusted Data via Externalizable.readExternal
> -----------------------------------------------------------------
>
> Key: FLEX-35290
> URL: https://issues.apache.org/jira/browse/FLEX-35290
> Project: Apache Flex
> Issue Type: Bug
> Components: BlazeDS
> Affects Versions: BlazeDS 4.7.2
> Reporter: Markus Wulftange
> Priority: Critical
> Labels: security
>
> The AMF deserialization implementation of Flex BlazeDS is vulnerable to
> Deserialization of Untrusted Data via
> {{Externalizable.readExternal(ObjectInput)}}.
> By sending a specially crafted AMF message, it is possible to make the server
> establish a connection to an endpoint specified in the message and request an
> RMI remote object from that endpoint. This can result in the execution of
> arbitrary code on the server via Java deserialization.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)