Deserialization of Untrusted Data in Pippo
Critical severity
GitHub Reviewed
Published
Oct 24, 2018
to the GitHub Advisory Database
•
Updated Mar 4, 2024
Description
Published to the GitHub Advisory Database
Oct 24, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 4, 2024
An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
References