-
Notifications
You must be signed in to change notification settings - Fork 310
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
YAML deserialization vulnerability leads to RCE #314
Milestone
Comments
stone-98
added a commit
to stone-98/nacos-spring-project
that referenced
this issue
Nov 16, 2023
…L deserialization.
5 tasks
stone-98
added a commit
to stone-98/nacos-spring-project
that referenced
this issue
Nov 20, 2023
stone-98
added a commit
to stone-98/nacos-spring-project
that referenced
this issue
Nov 21, 2023
KomachiSion
pushed a commit
that referenced
this issue
Nov 22, 2023
@ready to close@ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Issue Description
The SnakeYaml's Constructor() class is used in the component nacos-spring-context, but it does not restrict types that can be instantiated during deserialization.
Describe what happened (or what feature you want)
Deserializing yaml content provided by an attacker can lead to remote code execution.
So when spring framework project uses nacos-spring-context as a dependency, It will be easily RCE by just adding evil config in nacos server.
Describe what you expected to happen
Unsupported YAML content.
How to reproduce it (as minimally and precisely as possible)
Tell us your environment
spring-framework 2.7.8
nacos-spring-context 1.1.1
Anything else we need to know?
The text was updated successfully, but these errors were encountered: