Description
An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
Remediation
References
https://github.com/pippo-java/pippo/issues/458
Related Vulnerabilities
CVE-2023-26126 Vulnerability in npm package m.static
CVE-2022-23106 Vulnerability in maven package io.jenkins:configuration-as-code
CVE-2022-39248 Vulnerability in maven package org.matrix.android:matrix-android-sdk2
CVE-2021-21266 Vulnerability in maven package org.openhab.addons.bundles:org.openhab.transform.xpath
CVE-2022-25908 Vulnerability in npm package create-choo-electron