The Java implementation of GraniteDS, version 3.1.1.GA, AMF3 deserializers derives class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialized Java objects that execute arbitrary code when deserialized.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/97382 | vdb entry third party advisory |
https://codewhitesec.blogspot.com/2017/04/amf.html | third party advisory exploit |
https://www.kb.cert.org/vuls/id/307983 | third party advisory us government resource |
http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution | third party advisory |