Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unsafe Object Deserialization #4

Closed
erik75269 opened this issue Jun 22, 2021 · 3 comments
Closed

Unsafe Object Deserialization #4

erik75269 opened this issue Jun 22, 2021 · 3 comments

Comments

@erik75269
Copy link
Contributor

erik75269 commented Jun 22, 2021

SummerBatch core contains code which deserializes object via instantiating a BinaryFormatter. It may be vulnerable to other attack categories, such as information disclosure or remote code execution.

@erik75269 erik75269 reopened this Jun 24, 2021
@erik75269
Copy link
Contributor Author

Problem solved with Commit:0409ce1

@erik75269
Copy link
Contributor Author

After serialization and deserialization, it requires to add appsettings.json in the project and setting up the assemblyName(support prefix-name and full name) for where the type defined.

@erik75269
Copy link
Contributor Author

erik75269 commented Jul 2, 2021

Please be sure to select the 'Copy Always' option in 'Copy to Output Directory' for the file appsettings.json. (default is 'Do not copy' which will cause runtime issues)

appsettings.json:

{
"Deserialization": {
"assemblyName": [
"com.myassembly",
"com.assembly.other.*"
]
}
}

@erik75269 erik75269 mentioned this issue Jul 8, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant