Skip to content

Commit b28d639

Browse files
Fixed errors in UnsafeDeserializationRmi.qhelp
1 parent 62c6bee commit b28d639

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

java/ql/src/experimental/Security/CWE/CWE-502/UnsafeDeserializationRmi.qhelp

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ In the worst case, it results in remote code execution.
1515
<p>
1616
Use only strings and primitive types in parameters of remote objects.
1717
</p>
18-
</p>
18+
<p>
1919
Set a filter for incoming serialized data by wrapping remote objects using either <code>UnicastRemoteObject.exportObject(Remote, int, ObjectInputFilter)</code>
2020
or <code>UnicastRemoteObject.exportObject(Remote, int, RMIClientSocketFactory, RMIServerSocketFactory, ObjectInputFilter)</code> methods.
2121
Those methods accept an <code>ObjectInputFilter</code> that decides which classes are allowed for deserialization.
@@ -26,6 +26,7 @@ It is also possible to set a process-wide deserialization filter.
2626
The filter can be set by with <code>ObjectInputFilter.Config.setSerialFilter(ObjectInputFilter)</code> method,
2727
or by setting system or security property <code>jdk.serialFilter</code>.
2828
Make sure that you use the latest Java versions that include JEP 290.
29+
Please note that the query is not sensitive to this mitigation.
2930
</p>
3031
<p>
3132
If switching to the latest Java versions is not possible,
@@ -62,11 +63,11 @@ Oracle:
6263
</li>
6364
<li>
6465
ITNEXT:
65-
<a href="https://itnext.io/java-rmi-for-pentesters-part-two-reconnaissance-attack-against-non-jmx-registries-187a6561314d">Java RMI for pentesters part two reconnaissance & attack against non-JMX registries</a>.
66+
<a href="https://itnext.io/java-rmi-for-pentesters-part-two-reconnaissance-attack-against-non-jmx-registries-187a6561314d">Java RMI for pentesters part two - reconnaissance &amp; attack against non-JMX registries</a>.
6667
</li>
6768
<li>
6869
MOGWAI LABS:
69-
<a href="https://mogwailabs.de/en/blog/2019/03/attacking-java-rmi-services-after-jep-290/">Attacking Java RMI services after JEP 290</a>
70+
<a href="https://mogwailabs.de/en/blog/2019/03/attacking-java-rmi-services-after-jep-290">Attacking Java RMI services after JEP 290</a>
7071
</li>
7172
<li>
7273
OWASP:

0 commit comments

Comments
 (0)