Open jfkimmes opened 4 years ago
I had a second look at the JDK commits. Turns out I missed this commit when I first looked into this.
Strings seem to be handled as an extra case now in unmarshalValue()
.
I didn't look into bypassing this. Just thought I'd let you know.
Hello, I have the same issue. Do you think It's possible to bypass these checks ?
Hi, thanks alot for your blogpost that I just discovered. I tried to follow along with the examples in this repository. Everything worked well up until the illegal method call deserialization attack.
I successfully ran your server (from the previous examples) and the client with the additional parameters and the YouDebug debugger attached.
The client, however, fails with a
java.lang.ClassCastException()
.I had a look at the OpenJDK commit history and it seems to me that no security patches have been applied since your blog post (?) Can you confirm that the attack still works? What Java Distribution were you using?
Best regards!