Skip to content

Up-to-date guidelines for serialization-based endpoints [SPR-15317] #19880

@spring-projects-issues

Description

@spring-projects-issues

Juergen Hoeller opened SPR-15317 and commented

Over the past few years, several incidents were related to exposing serialization-based endpoints to untrusted clients. We need to update our guidelines accordingly, in particular for the HTTP Invoker mechanism. While we generally recommend against Java serialization for external remoting purposes, there are some recent efforts that allow for controlled exposure there, in particular the serialization filter that recently got introduced at JDK level (https://blogs.oracle.com/java-platform-group/entry/incoming_filter_serialization_data_a).


Referenced from: commits 2236262, c4fda0e

Metadata

Metadata

Assignees

Labels

in: webIssues in web modules (web, webmvc, webflux, websocket)type: taskA general task

Type

No type

Projects

No projects

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions