漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Jackson Configuration Allows Code Execution with Unknown "Serialization Gadgets"
Vulnerability Description
When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown "deserialization gadgets" when enabling default typing.
CVSS Information
N/A
Vulnerability Type
可信数据的反序列化
Vulnerability Title
VMware Spring Batch 代码问题漏洞
Vulnerability Description
VMware Spring Batch是美国威睿(VMware)公司的一款用于大量数据并行处理的轻量级框架。 VMware Spring Batch 4.0.0版本至4.0.4版本、4.1.0版本至4.1.4版本和4.2.0版本至4.2.2版本中的Jackson配置存在代码问题漏洞。攻击者可利用该漏洞执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A