Vulnerability Description
An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pippo | Pippo | 1.11.0 |
Related Weaknesses (CWE)
References
- https://github.com/pippo-java/pippo/issues/458ExploitPatchThird Party Advisory
- https://github.com/pippo-java/pippo/issues/458ExploitPatchThird Party Advisory
FAQ
What is CVE-2018-18628?
CVE-2018-18628 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object t...
How severe is CVE-2018-18628?
CVE-2018-18628 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-18628?
Check the references section above for vendor advisories and patch information. Affected products include: Pippo Pippo.