cve/2019/CVE-2019-17556.md

40 lines
1.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-17556](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17556)
![](https://img.shields.io/static/v1?label=Product&message=Olingo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Deserialization%20vulnerability&color=brighgreen)
### Description
Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-05-26 14:27:05 +02:00
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
2024-05-26 14:27:05 +02:00
- https://github.com/alphaSeclab/sec-daily-2019
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/password520/Penetration_PoC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji