Apache ShardingSphere(incubator) deserialization vulnerability

Overview :
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere’s web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
Affected Product(s) :
ShardingSphere 4.0.0-RC3, 4.0.0

Solution :

  • Mitigation:
    4.0.0-RC3 and 4.0.0 users should upgrade to 4.0.1
    
    Example:
    An attacker can use untrusted data to fill in the DataSource Config after
    login the sharding-ui.
    
    Credit:
    This issue was discovered by WuXiong of QI`ANXIN YUNYING Labs.
    

References:
https://shardingsphere.apache.org/community/en/security/

Facebook
Twitter
LinkedIn

Recent Blog Posts

Best Intrusion Detection Systems (IDS) to Use in 2025
Top 5 Cybersecurity Risk Management Strategies for 2025
Top 5 Emerging API Security Threats in 2025
8 Best Security Operations Center (SOC) Providers for 2025
Top 7 Cloud DDoS Protection Providers for 2025

WAF Solution