Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apache UIMA Java SDK <3.5.0 反序列化漏洞 #299

Open
y1ong opened this issue Nov 9, 2023 · 0 comments
Open

Apache UIMA Java SDK <3.5.0 反序列化漏洞 #299

y1ong opened this issue Nov 9, 2023 · 0 comments
Labels

Comments

@y1ong
Copy link
Owner

y1ong commented Nov 9, 2023

漏洞描述

Apache UIMA 是一个用于分析非结构化内容(比如文本、视频和音频)的组件架构和软件框架实现。
由于Apache UIMA Java SDK在反序列化Java对象时没有验证数据,当应用程序中使用了Vinci 或 CasIOUtils时,攻击者可以通过发送恶意的 CAS 序列化对象执行恶意操作,导致任意代码执行。
ObjectInputFilter读取java序列化数据会严格过滤,可以通过设置全局或上下文特定的ObjectInputFilter来避免这个漏洞产生

参考链接

  1. https://www.oscs1024.com/hd/MPS-8r5d-9m7h
  2. https://nvd.nist.gov/vuln/detail/CVE-2023-39913
  3. apache/uima-uimaj@6a8ab16
  4. Drop CasAnnotationViewerApplet and CasTreeViewerApplet apache/uima-uimaj#339
  5. https://lists.apache.org/thread/lw30f4qlq3mhkhpljj16qw4fot3rg7v4
@y1ong y1ong added the vuln label Nov 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant