org.redisson:redisson@2.7.3 vulnerabilities

  • latest version

    3.41.0

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    25 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.redisson:redisson package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Deserialization of Untrusted Data

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data when the Netty framework is used to deserialize Java objects from messages received from the Redis server. An attacker can execute arbitrary code and potentially take control of the client's machine by tricking the client into communicating with a malicious server that includes specially crafted objects in its responses.

    Note:

    Even after the fix, it is recommended to not use Kryo5Codec as deserialization codec, as it is still vulnerable to arbitrary object deserialization due to the setRegistrationRequired(false) call. On the contrary, KryoCodec is safe to use. The fix applied to SerializationCodec only consists of adding an optional allowlist of class names, even though making this behavior the default is recommended.

    How to fix Deserialization of Untrusted Data?

    Upgrade org.redisson:redisson to version 3.22.0 or higher.

    [,3.22.0)