You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NettyRPC supports the utilization of the HessianSerializer and Hessian1Serializer protocol within its RPC communication framework. We discovered that attackers can achieve Remote Code Execution(RCE) attacks by sending meticulously crafted serialized data to the service port utilizing these two protocols.
Reproduce
Environment
JDK 8u_361
NettyPRC 1.2
Provider Side
We use the build-in module "netty-rpc-test" of the project to set up the environment for the attack reproduce.
(1) Run Zookeeper
(2) Start server
Problem Statement
NettyRPC supports the utilization of the
HessianSerializer
andHessian1Serializer
protocol within its RPC communication framework. We discovered that attackers can achieve Remote Code Execution(RCE) attacks by sending meticulously crafted serialized data to the service port utilizing these two protocols.Reproduce
Environment
Provider Side
We use the build-in module "netty-rpc-test" of the project to set up the environment for the attack reproduce.
(1) Run Zookeeper
(2) Start server
Attacker Side
run the
RpcTest.main
The injection object: EvilObjGenerator.getEvil()
Attack Impact
Remote Command Execution (RCE), in this attack test, manifests as the invocation of the calculator application.
The injection object can be used to exploit
Hessian1Serializer
as well.The text was updated successfully, but these errors were encountered: