TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Possible Spring core RCE

61 pointsby chillaxabout 3 years ago

11 comments

makomkabout 3 years ago
Seems unlikely. The commit this speculates is the fix for the supposed RCE does not appear to change the behaviour of Spring in any way - it just refactors some code into a seperate function, adds a unit test for that function, and marks the use of serialization-related functions as depreciated due to their history of RCE issues. The apparent reason for the refactoring is to avoid triggering the depreciation warning for one particular use of serialization which should be safe (it serializes and then immediately deserializes a non-attacker-controlled object).
评论 #30866088 未加载
freeqazabout 3 years ago
(Author of the OG Log4Shell post here)<p>I&#x27;m poking around at the Spring code and posting some notes about what I find on Twitter[0].<p>I&#x27;m not a Java expert so if anybody feels like chiming in to help connect the dots for others, please feel free. It&#x27;s late over here so I&#x27;m just doing my best to help determine if this is a real problem or just fear mongering.<p>0: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;LunaSecIO&#x2F;status&#x2F;1509084844042510336" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;LunaSecIO&#x2F;status&#x2F;1509084844042510336</a><p>EDIT:<p>I wrote a basic vulnerable app on GitHub[1] that is helpful for finding the most &quot;simple&quot; payload that could trigger this RCE. If anybody with better Java skills than myself would be willing to poke at this for a sec, that&#x27;d be super appreciated.<p>I was using this guide[2] with the ysoserial section to generate a deserialzation payload for this. I still don&#x27;t have enough Java-fu to understand how to get that to fire though, and it&#x27;s 3am so my brain is shot. Perhaps with these pointers somebody else can figure out that part to help sort out the impact around this possible RCE.<p>1: <a href="https:&#x2F;&#x2F;github.com&#x2F;lunasec-io&#x2F;spring-rce-vulnerable-app" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;lunasec-io&#x2F;spring-rce-vulnerable-app</a><p>2: <a href="https:&#x2F;&#x2F;foxglovesecurity.com&#x2F;2015&#x2F;11&#x2F;06&#x2F;what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability&#x2F;" rel="nofollow">https:&#x2F;&#x2F;foxglovesecurity.com&#x2F;2015&#x2F;11&#x2F;06&#x2F;what-do-weblogic-web...</a>
评论 #30853509 未加载
评论 #30853360 未加载
评论 #30852902 未加载
MattPalmer1086about 3 years ago
On what basis does anyone think there is a 0 day here?<p>The commit just looks like sane defensive programming. Serialisation is a known source of RCEs, so they deprecate its use.
Copenjinabout 3 years ago
The blog post on Kendra looks like a draft hoping for an actual confirmation&#x2F;poc to come up, the mitigation just explains manually how to replicate the PR #28075.<p>Edit: They just translated the chinese post you can find linked here.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;spring-projects&#x2F;spring-framework&#x2F;pull&#x2F;28075" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;spring-projects&#x2F;spring-framework&#x2F;pull&#x2F;280...</a>
评论 #30853480 未加载
annnooabout 3 years ago
This was actually demented by one of the Spring developers. <a href="https:&#x2F;&#x2F;github.com&#x2F;BugAlertDotOrg&#x2F;bugalert&#x2F;pull&#x2F;43#issuecomment-1082907298" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;BugAlertDotOrg&#x2F;bugalert&#x2F;pull&#x2F;43#issuecomm...</a>
评论 #30861086 未加载
vips7Labout 3 years ago
I don’t see how the linked code is an RCE. The deserialization function is used on trusted input from an object that is already in memory.<p>How is this being upvoted without an actual POC and using language like “possible” and “may”?
评论 #30857357 未加载
MrBuddyCasinoabout 3 years ago
Can&#x27;t tell if this depends on certain user code - does one have to use SerializationUtils or JCache explicitly in order to be vulnerable, or does the vulnerability exist by default?
评论 #30852590 未加载
chillaxabout 3 years ago
For some reason the link didnt work for me previously, so I linked to github. The notice can also be found at bugalert.org: <a href="https:&#x2F;&#x2F;bugalert.org&#x2F;content&#x2F;notices&#x2F;2022-03-29-spring.html" rel="nofollow">https:&#x2F;&#x2F;bugalert.org&#x2F;content&#x2F;notices&#x2F;2022-03-29-spring.html</a>
评论 #30852502 未加载
TeeWEEabout 3 years ago
Where is the explanation that serialize &#x2F; deserialize has a RCE bug?
ammo1662about 3 years ago
Previously I submitted a thread about this:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30850400" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30850400</a><p>However the original image is deleted from twitter.<p>If it is true, you will need to downgrade to JDK8. But to solve Log4J issue, you need JDK9+...
评论 #30852415 未加载
评论 #30852408 未加载
formerly_provenabout 3 years ago
Java and trivially exploitable RCE are certainly believable.
评论 #30853110 未加载
评论 #30853330 未加载