Skip to content

Fix: Replace Unsafe Java Deserialization with Jackson Mapper #770

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: dev
Choose a base branch
from

Conversation

simei2k
Copy link

@simei2k simei2k commented Apr 20, 2025

This PR addresses a critical security vulnerability in the code that could lead to Remote Code Execution (RCE).

The code was using Java's built-in ObjectInputStream.readObject() for deserialization, which is known to be vulnerable to deserialization attacks if the input comes from an untrusted source.

This vulnerability was initially found and fixed in the git commit below.

References:
https://github.com/apache/helix/commit/7af17a31819859e6c46bcb3994ef7d52347760c4

This PR addresses a critical security vulnerability in the code that could lead to Remote Code Execution (RCE).

The code was using Java's built-in ObjectInputStream.readObject() for deserialization, which is known to be vulnerable to deserialization attacks if the input comes from an untrusted source.

This vulnerability was initially found and fixed in the git commit below.

References:
apache/helix@7af17a3
@click33
Copy link
Collaborator

click33 commented May 3, 2025

sa-token-jboot-plugin 插件是由另一位用户开发提交的pr,如果将 jdk 序列化修改为 Jackson 序列化可能会违背该作者的原意,故不能合并此PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants