Skip to content

Commit 46b08fd

Browse files
Todor NeykovMrEasy
Todor Neykov
authored andcommitted
[Bug #173552] Insecure Deserialization in Apache Aries Library
[Bug #173552] Insecure Deserialization in Apache Aries Library
1 parent fae29f1 commit 46b08fd

File tree

2 files changed

+168
-2
lines changed

2 files changed

+168
-2
lines changed

provider/fastbin/src/main/java/org/apache/aries/rsa/provider/fastbin/api/ObjectSerializationStrategy.java

+52-2
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,15 @@
2121
import java.io.IOException;
2222
import java.io.ObjectOutputStream;
2323
import java.text.MessageFormat;
24+
import java.util.ArrayList;
25+
import java.util.Arrays;
26+
import java.util.HashSet;
27+
import java.util.List;
28+
import java.util.Set;
2429

2530
import org.apache.aries.rsa.provider.fastbin.FastBinProvider;
2631
import org.apache.aries.rsa.provider.fastbin.util.ClassLoaderObjectInputStream;
32+
import org.apache.aries.rsa.provider.fastbin.util.FilteredClassLoaderObjectInputStream;
2733
import org.fusesource.hawtbuf.DataByteArrayInputStream;
2834
import org.fusesource.hawtbuf.DataByteArrayOutputStream;
2935
import org.osgi.framework.ServiceException;
@@ -38,6 +44,50 @@ public class ObjectSerializationStrategy implements SerializationStrategy {
3844
private static final ObjectSerializationStrategy V1 = INSTANCE;
3945
private int protocolVersion = FastBinProvider.PROTOCOL_VERSION;
4046

47+
private static final Set<String> ALLOWEDCLASSES;
48+
private static final FilteredClassLoaderObjectInputStream.AllowlistPackagesPredicate ALLOWED_PACKAGES;
49+
private static final String ADDITIONAL_ALLOWED_PACKAGE = System.getProperty( "org.apache.aries.rsa.provider.fastbin.api.DESERIALIZATION_PACKAGE_ALLOW_LIST", "");
50+
private static final String ADDITIONAL_ALLOWED_CLASSES = System.getProperty( "org.apache.aries.rsa.provider.fastbin.api.DESERIALIZATION_CLASS_ALLOW_LIST", "");
51+
52+
static
53+
{
54+
Set<String> classes = new HashSet<>();
55+
classes.addAll(Arrays.asList(
56+
"B", // byte
57+
"C", // char
58+
"D", // double
59+
"F", // float
60+
"I", // int
61+
"J", // long
62+
"S", // short
63+
"Z", // boolean
64+
"L" // Object type (LClassName;)
65+
));
66+
final String[] customClasses = ADDITIONAL_ALLOWED_CLASSES.split(",");
67+
if (customClasses.length > 0)
68+
{
69+
classes.addAll(Arrays.asList(customClasses));
70+
}
71+
ALLOWEDCLASSES = classes;
72+
73+
List<String> packages = new ArrayList<>();
74+
packages.addAll(Arrays.asList(
75+
"java",
76+
"javax",
77+
"Ljava",
78+
"org.apache.aries.rsa",
79+
"org.osgi.framework",
80+
"com.seeburger"));
81+
82+
final String[] customPackages = ADDITIONAL_ALLOWED_PACKAGE.split(",");
83+
if (customPackages.length > 0)
84+
{
85+
packages.addAll(Arrays.asList(customPackages));
86+
}
87+
ALLOWED_PACKAGES = new FilteredClassLoaderObjectInputStream.AllowlistPackagesPredicate(packages);
88+
}
89+
90+
4191

4292
public String name() {
4393
return "object";
@@ -50,7 +100,7 @@ public void encodeRequest(ClassLoader loader, Class<?>[] types, Object[] args, D
50100
}
51101

52102
public void decodeResponse(ClassLoader loader, Class<?> type, DataByteArrayInputStream source, AsyncCallback result) throws IOException, ClassNotFoundException {
53-
ClassLoaderObjectInputStream ois = new ClassLoaderObjectInputStream(source);
103+
ClassLoaderObjectInputStream ois = new FilteredClassLoaderObjectInputStream(source, ALLOWEDCLASSES, ALLOWED_PACKAGES);
54104
ois.setClassLoader(loader);
55105
Throwable error = (Throwable) ois.readObject();
56106
Object value = ois.readObject();
@@ -62,7 +112,7 @@ public void decodeResponse(ClassLoader loader, Class<?> type, DataByteArrayInput
62112
}
63113

64114
public void decodeRequest(ClassLoader loader, Class<?>[] types, DataByteArrayInputStream source, Object[] target) throws IOException, ClassNotFoundException {
65-
final ClassLoaderObjectInputStream ois = new ClassLoaderObjectInputStream(source);
115+
ClassLoaderObjectInputStream ois = new FilteredClassLoaderObjectInputStream(source, ALLOWEDCLASSES, ALLOWED_PACKAGES);
66116
ois.setClassLoader(loader);
67117
final Object[] args = (Object[]) ois.readObject();
68118
if( args!=null ) {
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
/*
2+
* FilteredClassLoaderObjectInputStream.java
3+
*
4+
* created at 2024-09-27 by t.neykov <[email protected]>
5+
*
6+
* Copyright (c) SEEBURGER AG, Germany. All Rights Reserved.
7+
*/
8+
9+
package org.apache.aries.rsa.provider.fastbin.util;
10+
11+
12+
import java.io.IOException;
13+
import java.io.InputStream;
14+
import java.io.InvalidClassException;
15+
import java.io.ObjectStreamClass;
16+
import java.util.List;
17+
import java.util.Set;
18+
import java.util.function.Predicate;
19+
20+
/**
21+
* This class is a subclass of {@link ClassLoaderObjectInputStream} that only allows a specific set of classes to be
22+
* deserialized. This is to prevent deserialization attacks.
23+
*/
24+
public class FilteredClassLoaderObjectInputStream extends ClassLoaderObjectInputStream
25+
{
26+
/**
27+
* Property to disable secure deserialization. If this property is set to true, then the class will not throw an
28+
* exception if the class is not in the allowed classes list. This is useful for testing.
29+
*/
30+
static final String PROPERTY_USE_INSECURE_DESERIALIZATION = "org.apache.aries.rsa.provider.fastbin.util.useInsecureDeserialization";
31+
static boolean useInsecureDeserialization = Boolean.getBoolean(PROPERTY_USE_INSECURE_DESERIALIZATION);
32+
33+
private final Set<String> allowedClasses;
34+
private Predicate<String> allowedPackages;
35+
36+
public FilteredClassLoaderObjectInputStream(InputStream s, Set<String> allowedClasses)
37+
throws IOException
38+
{
39+
super(s);
40+
if (allowedClasses == null)
41+
{
42+
throw new IllegalArgumentException("allowedClasses must not be null");
43+
}
44+
45+
this.allowedClasses = allowedClasses;
46+
}
47+
48+
public FilteredClassLoaderObjectInputStream(InputStream inArg, Set<String> allowedClasses, Predicate<String> allowedPackages)
49+
throws IOException
50+
{
51+
super(inArg);
52+
53+
if (allowedClasses == null)
54+
{
55+
throw new IllegalArgumentException("allowedClasses must not be null");
56+
}
57+
58+
this.allowedClasses = allowedClasses;
59+
this.allowedPackages = allowedPackages;
60+
}
61+
62+
@Override
63+
protected Class< ? > resolveClass(ObjectStreamClass clsDescriptor)
64+
throws IOException, ClassNotFoundException
65+
{
66+
String className = removeArrayMarkersFromClassName(clsDescriptor);
67+
68+
if (!useInsecureDeserialization)
69+
{
70+
if (allowedClasses.contains(className))
71+
{
72+
return super.resolveClass(clsDescriptor);
73+
}
74+
if (allowedPackages != null && allowedPackages.test(className))
75+
{
76+
return super.resolveClass(clsDescriptor);
77+
}
78+
throw new InvalidClassException(className, "Invalid de-serialisation data. POSSIBLE ATTACK. Invalid class=" + className);
79+
}
80+
81+
return super.resolveClass(clsDescriptor);
82+
}
83+
84+
85+
/**
86+
* Removes array markers from the class name. (could be more than one).
87+
* @param clsDescriptor
88+
* @return
89+
*/
90+
private static String removeArrayMarkersFromClassName(ObjectStreamClass clsDescriptor)
91+
{
92+
String className = clsDescriptor.getName();
93+
int leadingBrackets = 0;
94+
while (className.charAt(leadingBrackets) == '[') {
95+
leadingBrackets++;
96+
}
97+
return className.substring(leadingBrackets);
98+
}
99+
100+
101+
public static class AllowlistPackagesPredicate implements Predicate<String>
102+
{
103+
private final List<String> allowedPackagesList;
104+
105+
public AllowlistPackagesPredicate(List<String> allowedPackagesList)
106+
{
107+
this.allowedPackagesList = allowedPackagesList;
108+
}
109+
110+
@Override
111+
public boolean test(String className)
112+
{
113+
return allowedPackagesList.stream().anyMatch(className::startsWith);
114+
}
115+
}
116+
}

0 commit comments

Comments
 (0)