Vulnerabilities > CVE-2017-20189 - Deserialization of Untrusted Data vulnerability in Clojure
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 89 |
Common Weakness Enumeration (CWE)
References
- https://clojure.atlassian.net/browse/CLJ-2204
- https://clojure.atlassian.net/browse/CLJ-2204
- https://github.com/clojure/clojure/commit/271674c9b484d798484d134a5ac40a6df15d3ac3
- https://github.com/clojure/clojure/commit/271674c9b484d798484d134a5ac40a6df15d3ac3
- https://github.com/frohoff/ysoserial/pull/68/files
- https://github.com/frohoff/ysoserial/pull/68/files
- https://hackmd.io/%40fe1w0/HyefvRQKp
- https://hackmd.io/%40fe1w0/HyefvRQKp
- https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378
- https://security.snyk.io/vuln/SNYK-JAVA-ORGCLOJURE-5740378