CVE-2018-18628

CVE-2018-18628

An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.

Source: CVE-2018-18628

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다