Yes, I guess it should be prevented. Duh!
On Sun, Nov 8, 2015 at 2:16 PM Mark Thomas <ma...@apache.org> wrote:

> On 08/11/2015 19:13, James Carman wrote:
> > If they can execute Runtime.exec then they can execute System.setProperty
>
> Yes. But the point you seem to seem to be missing is that if the system
> property is set such that this attack is blocked, they can't use the
> attack to change the system property and unblock it.
>
> Mark
>
>
> > On Sun, Nov 8, 2015 at 2:11 PM James Carman <ja...@carmanconsulting.com>
> > wrote:
> >
> >> System.setProperty()
> >>
> >>
> >> On Sun, Nov 8, 2015 at 2:10 PM Thomas Neidhart <
> thomas.neidh...@gmail.com>
> >> wrote:
> >>
> >>> On 11/08/2015 07:51 PM, James Carman wrote:
> >>>> Couldn't they use the same attack vector to set a system property
> also?
> >>> I
> >>>> do believe that would be possible
> >>>
> >>> for this you need a way to execute code via a de-serialized class.
> >>> Right now, the simplest way to do so is via the InvokerTransformer.
> >>>
> >>> There are surely other ways to do so, but if the only available way is
> >>> blocked (i.e. InvokerTransformer can not be deserialized), a remote
> >>> attacker cannot set a system property via this attack vector.
> >>>
> >>> btw. setting a system property can also be restricted by a
> >>> SecurityManager.
> >>>
> >>> I am -1 on a programmatic interface, and for the 4.X branch I propose
> to
> >>> remove the serialization support completely.
> >>>
> >>> Thomas
> >>>
> >>> ---------------------------------------------------------------------
> >>> To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> >>> For additional commands, e-mail: dev-h...@commons.apache.org
> >>>
> >>>
> >
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> For additional commands, e-mail: dev-h...@commons.apache.org
>
>

Reply via email to