Skip to content

Java Deserialization: Apache Commons Collections Library #13

@rmikehodges

Description

@rmikehodges

/*
Title: Apache Commons Collections Deserialization
Description: Search engine meta data about the finding
*/

  • LAST UPDATED DATE: 12 - 13 - 15
  • LAST UPDATED BY: Mike Hodges

Summary

The Apache Commons Collections Java library insecurely deserializes data
and with InvokerTransformer an attacker can build serializable objects that
will execute arbitrary Java code.

Capabilities and Risk

Any application that has the Apache Commons Collection library in its Java
class path and accepts serialized data can be coerced into executing arbrtrary code
on the attacker's behalf

This poses a high risk to any server running the ACC library and could
lead to complete compromise of the system.

Detection

Verify the server is running Java with the Apache Commons Collections in the class path.

Identify serialized Java objects being sent ot the application

Replace the serialized Java object with your base-64 encoded payload and verify.

Remediation

Santizie all deserialized data being processed to the application

Update the Apache Commons Collection to the newest version.
Only fixes some of the insecure functions, some still exist
From Adobe's Statement:
"However, to be clear: this is not the only known and especially not unknown useable gadget. So replacing your installations with a hardened version of Apache Commons Collections will not make your application resist this vulnerability.

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions