[ 
https://issues.apache.org/jira/browse/ARTEMIS-458?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

clebert suconic closed ARTEMIS-458.
-----------------------------------

> JMSObjectMessage deserializes potentially malicious objects allowing Remote 
> Code Execution
> ------------------------------------------------------------------------------------------
>
>                 Key: ARTEMIS-458
>                 URL: https://issues.apache.org/jira/browse/ARTEMIS-458
>             Project: ActiveMQ Artemis
>          Issue Type: Bug
>            Reporter: Jason Shepherd
>
> We should define a whitelist of classes that need to be deserialized as part 
> of an object message and allowers users to add their own.
> Classes that probably need updating include: 
> * 
> /artemis-jms-client/src/main/java/org/apache/activemq/artemis/jms/client/ActiveMQObjectMessage.java
> * 
> ./artemis-ra/src/main/java/org/apache/activemq/artemis/ra/ActiveMQRAObjectMessage.java
> * 
> ./artemis-rest/src/main/java/org/apache/activemq/artemis/rest/queue/ConsumedObjectMessage.java
> Another option might be to enable the security manager for artemis to 
> restrict the module actions. This will depend on 
> https://issues.jboss.org/browse/MODULES-236 being backported to EAP so that 
> we can use environment variables in file paths for portibility.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to