Prophaze WAF Blog

Apache ShardingSphere(incubator) deserialization vulnerability - Cloud WAF

Written by Rajaneesh | Mar 12, 2020 12:23:34 PM
Overview :
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere’s web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
Affected Product(s) :
ShardingSphere 4.0.0-RC3, 4.0.0
 

Solution :

  • Mitigation:
    4.0.0-RC3 and 4.0.0 users should upgrade to 4.0.1
    
    Example:
    An attacker can use untrusted data to fill in the DataSource Config after
    login the sharding-ui.
    
    Credit:
    This issue was discovered by WuXiong of QI`ANXIN YUNYING Labs.
    

References:
https://shardingsphere.apache.org/community/en/security/