This repository was archived by the owner on Apr 15, 2018. It is now read-only.
Require Java Serializable types to be whitelisted #21
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR fixes the security issue in #14. However, rather than taking the approach of overriding
ObjectInputStream
to whitelist class names, classes are whitelisted at theSerializer
level instead. This implements Java serialization simply as anotherTypeSerializer
. This meansSerializable
types are serialized to the buffer. If aSerializable
type is registered then the type will be serialized with a type ID. When the type is read during deserialization, the class will be loaded by the type ID. This ensures that only classes that have been whitelisted can be loaded when deserializing a registeredSerializable
type. If an attacker attempts to load an arbitrary class by injecting a serializable type ID, they can only load a registered class.The flaw does still exist for
Serializable
types that are serialized without having been registered/whitelisted. If aSerializable
object is serialized without having been registered, the class name will be serialized and deserialized. However, this feature is disabled by default. The user must explicitly disable whitelisting to allow class names to be serialized at all. If whitelisting is enabled, an exception will be thrown prior to loading any class during deserialization.