ObjectSocketWrapper.java in Gradle 2.12 allows remote attackers to execute arbitrary code via a crafted serialized object.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://philwantsfish.github.io/security/java-deserialization-github | release notes vendor advisory |
https://discuss.gradle.org/t/a-security-issue-about-gradle-rce/17726 | exploit third party advisory technical description |