You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Jupiter utilizes the Hessian protocol as a component of its RPC communication. However, this protocol presents security risks, as attackers can achieve Remote Code Execution (RCE) attacks by meticulously crafting serialized data.
Reproduce
Provider Side
We employed the built-in module "jupiter-example" of the project to set up the test environment for the attack. The JDK version used is 8u65.
The Malicious LDAP Server
We used "marshalsec-0.0.3-SNAPSHOT-all.jar" tool to set up a malicious LDAP server.
Deploying an HTTP server in the directory containing the malicious files.
POC
The code for sending client requests.
Utilizing the code from the org.jupiter.example.non.annotation.JupiterClient.java example, modify the transmitted data to be carefully designed serialized data (Line 67).
Problem Description
Jupiter utilizes the Hessian protocol as a component of its RPC communication. However, this protocol presents security risks, as attackers can achieve Remote Code Execution (RCE) attacks by meticulously crafting serialized data.
Reproduce
Provider Side
We employed the built-in module "jupiter-example" of the project to set up the test environment for the attack. The JDK version used is 8u65.
The Malicious LDAP Server
POC
The code for sending client requests.
Utilizing the code from the org.jupiter.example.non.annotation.JupiterClient.java example, modify the transmitted data to be carefully designed serialized data (Line 67).
Attack Impact
Capable of executing an RCE attack, in this attack test, it is demonstrated through the launch of the calculator application.
The text was updated successfully, but these errors were encountered: