[ 
https://issues.apache.org/jira/browse/LANG-1734?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18045196#comment-18045196
 ] 

Gary D. Gregory commented on LANG-1734:
---------------------------------------

I updated the javadoc to Document a safer deserialization option in Javadoc for 
SerializationUtils.



> Deprecate/replace SerializationUtils.deserialize
> ------------------------------------------------
>
>                 Key: LANG-1734
>                 URL: https://issues.apache.org/jira/browse/LANG-1734
>             Project: Commons Lang
>          Issue Type: Task
>          Components: lang.*
>            Reporter: Arnout Engelen
>            Priority: Minor
>             Fix For: 3.20.1
>
>
> SerializationUtils.deserialize should never be used with untrusted input: it 
> is generally not possible to prove the absence of classes on the classpath 
> that can be used as 'gadgets' for deserialization attacks.
> When SerializationUtils.deserialize was introduced, Java serialization was 
> still 'in vogue' and the JDK APIs for deserialization were awkward to use. 
> Nowadays, other serialization mechanisms (and serialization proxies) are more 
> popular, and the Java APIs have gotten much better, so there isn't much 
> reason for "SerializationUtils.deserialize" anymore.
> For these reasons, it might be good to deprecate 
> SerializationUtils.deserialize, or at least more clearly mark it as not 
> suitable to be used with untrusted input. We might also want to replace it 
> with variants that encourage allow/denylisting or other security filters, or 
> recommend 
> [https://docs.oracle.com/en/java/javase/11/core/serialization-filtering1.html]
>  for that.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to