First published: Tue Oct 23 2018(Updated: )
An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pippo Pippo | =1.11.0 | |
maven/ro.pippo:pippo-core | <1.12.0 | 1.12.0 |
=1.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2018-18628.
The severity rating of CVE-2018-18628 is 9.8, which is classified as critical.
The affected software version of CVE-2018-18628 is Pippo 1.11.0.
The vulnerability CVE-2018-18628 allows an attacker to deserialize a malicious object using the function SerializationSessionDataTranscoder.decode() in Pippo 1.11.0, which can lead to arbitrary code execution.
At the moment, there is no known fix available for CVE-2018-18628. It is recommended to upgrade to a newer version when a fix becomes available.