org.graniteds:granite-generator@2.2.0.SP2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.graniteds:granite-generator package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Execution

org.graniteds:granite-generator provides server and client libraries that can be used to connect desktop and mobile applications to a server using the AMF3 or JMF serialization protocols, through RPC (remoting) and different messaging technologies (Comet, WebSocket, UDP).

Affected versions of the package are vulnerable to Deserialization of Untrusted Data. A remote attacker with the ability to spoof or control information may be able to send serialized Java objects with pre-set properties that result in arbitrary code execution when deserialized.

How to fix Arbitrary Code Execution?

There is no fix version for org.graniteds:granite-generator.

[,3.1.0.GA]
  • H
Arbitrary Code Execution

org.graniteds:granite-generator provides server and client libraries that can be used to connect desktop and mobile applications to a server using the AMF3 or JMF serialization protocols, through RPC (remoting) and different messaging technologies (Comet, WebSocket, UDP).

Affected versions of the package are vulnerable to Deserialization of Untrusted Data. AMF3 deserializers derives class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialized Java objects that execute arbitrary code when deserialized.

How to fix Arbitrary Code Execution?

There is no fix version for org.graniteds:granite-generator.

[,3.1.0.GA]