Completed
Details
Assignee
UnassignedUnassignedReporter
Alex MillerAlex MillerApproval
OkPatch
Code and TestPriority
CriticalFix versions
Details
Details
Assignee
Unassigned
UnassignedReporter
Alex Miller
Alex MillerApproval
Ok
Patch
Code and Test
Priority
Fix versions
Created July 12, 2017 at 1:07 PM
Updated September 6, 2017 at 5:42 PM
Resolved September 6, 2017 at 5:42 PM
If a server can deserialize objects from an untrusted source, it is possible to craft a serialized object that runs arbitrary code on deserialization. Classes in the Clojure jar can be used for this purpose and this may lead to blacklisting the Clojure jar in some environments.
Demonstration of how to create such an object: https://github.com/frohoff/ysoserial/pull/68/files
The serialized class being constructed in the attack is
clojure.inspector.proxy$javax.swing.table.AbstractTableModel$ff19274a
, butclojure.core.proxy$clojure.lang.APersistentMap$ff19274a
and proxy classes created by users are also susceptible. Clojure proxies contain a field (__clojureFnMap) that is a map of method names to proxy functions. Clojure AOT compiles the clojure.inspector and clojure.core.proxy code which generates the classes named above. These classes are then included inside the clojure jar.The attack constructs an instance of one of these proxy classes and adds a "hashCode" proxy method to the proxy's table. The method is a Clojure function that can run arbitrary code. This instance is then put inside a HashMap and the whole thing is serialized. On deserialization, the HashMap will invoke hashCode() on the proxy object and cause the execution of the arbitrary code.
Note that most uses of proxy will create objects that cannot be serialized anyway, due to the common use of literal function bodies.
Proposed: Modify proxy so that the classes it generates are neither deserializable (to disable the attack) nor serializable (to avoid misleading users). The patch causes proxy classes to have
readObject
andwriteObject
methods that just throw an exception, when Serializable is in the inheritance tree of the proxy class. This is technically a breaking change since it is possible to construct a proxy that can be serialized, but such classes are unlikely in the wild and inherently insecure.Patch: clj-2204-disable-proxy-serialization.patch
Prescreened by: Alex Miller
Background: Raised at https://groups.google.com/d/msg/clojure/WaL3hHzsevI/7zHU-L7LBQAJ and similar to issues reported on Apache Commons. See also:
https://deadcode.me/blog/2016/09/02/Blind-Java-Deserialization-Commons-Gadgets.html
https://deadcode.me/blog/2016/09/18/Blind-Java-Deserialization-Part-II.html
https://issues.apache.org/jira/browse/COLLECTIONS-580
https://www.kb.cert.org/vuls/id/576313
https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread