Skip to content

Commit 617ba65

Browse files
Improved docs for SpringHttpInvokerUnsafeDeserialization.ql
1 parent 15a43ff commit 617ba65

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

java/ql/src/experimental/Security/CWE/CWE-502/SpringHttpInvokerUnsafeDeserialization.qhelp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@
33

44
<overview>
55
<p>
6-
Spring Framework provides an abstract base class <code>RemoteInvocationSerializingExporter</code>
6+
The Spring Framework provides an abstract base class <code>RemoteInvocationSerializingExporter</code>
77
for defining remote service exporters.
88
A Spring exporter, which is based on this class, deserializes incoming data using <code>ObjectInputStream</code>.
99
Deserializing untrusted data is easily exploitable and in many cases allows an attacker
1010
to execute arbitrary code.
1111
</p>
1212
<p>
13-
Spring Framework also provides two classes that extend <code>RemoteInvocationSerializingExporter</code>:
13+
The Spring Framework also provides two classes that extend <code>RemoteInvocationSerializingExporter</code>:
1414
<li>
1515
<code>HttpInvokerServiceExporter</code>
1616
</li>
@@ -24,7 +24,7 @@ using unsafe <code>ObjectInputStream</code>. If a remote attacker can reach such
2424
it results in remote code execution in the worst case.
2525
</p>
2626
<p>
27-
CVE-2016-1000027 has been assigned to this issue in Spring Framework. There is no fix for that.
27+
CVE-2016-1000027 has been assigned to this issue in the Spring Framework. It is regarded as a design limitation, and can be mitigated but not fixed outright.
2828
</p>
2929
</overview>
3030

@@ -36,7 +36,7 @@ Instead, use other message formats for API endpoints (for example, JSON),
3636
but make sure that the underlying deserialization mechanism is properly configured
3737
so that deserialization attacks are not possible. If the vulnerable exporters can not be replaced,
3838
consider using global deserialization filters introduced by JEP 290.
39-
In general, avoid deserialization of untrusted data.
39+
In general, avoid using Java's built-in deserialization methods on untrusted data.
4040
</p>
4141
</recommendation>
4242

java/ql/src/experimental/Security/CWE/CWE-502/SpringHttpInvokerUnsafeDeserialization.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,4 @@ private predicate createsRemoteInvocationSerializingExporterBean(Method method)
5252
from Method method
5353
where createsRemoteInvocationSerializingExporterBean(method)
5454
select method,
55-
"Unasafe deserialization in a remote service exporter in '" + method.getName() + "' method"
55+
"Unsafe deserialization in a remote service exporter in '" + method.getName() + "' method"

0 commit comments

Comments
 (0)