Apache ShardingSphere(incubator) deserialization vulnerability

[vc_row][vc_column][vc_column_text]

Pérez Overview :
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere’s web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
http://sjfiremuseum.org/history/modern-era/ Affected Product(s) :
ShardingSphere 4.0.0-RC3, 4.0.0
 

Solution :

  • Mitigation:
    4.0.0-RC3 and 4.0.0 users should upgrade to 4.0.1
    
    Example:
    An attacker can use untrusted data to fill in the DataSource Config after
    login the sharding-ui.
    
    Credit:
    This issue was discovered by WuXiong of QI`ANXIN YUNYING Labs.
    

References:
https://shardingsphere.apache.org/community/en/security/

[/vc_column_text][/vc_column][/vc_row]

Facebook
Twitter
LinkedIn

Recent Posts

Follow Us

Web Application Firewall Solution