Логотип exploitDog
bind:CVE-2021-29508
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-29508

Количество 2

Количество 2

nvd логотип

CVE-2021-29508

больше 4 лет назад

Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019. This also applies to the fork of Wire.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-hpw7-3vq3-mmv6

больше 4 лет назад

Insecure deserialization in Wire

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-29508

Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019. This also applies to the fork of Wire.

CVSS3: 9.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-hpw7-3vq3-mmv6

Insecure deserialization in Wire

CVSS3: 9.1
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу