Learn about CVE-2017-3200, a vulnerability in GraniteDS Framework version 3.1.1.G allowing arbitrary class instantiation and code execution. Find mitigation steps and preventive measures here.
CVE-2017-3200 was published on June 11, 2018, by GraniteDS. The vulnerability affects version 3.1.1.G of the Framework. The issue allows the instantiation of any class through their public parameter-less constructor, potentially leading to arbitrary code execution.
Understanding CVE-2017-3200
CVE-2017-3200 is a vulnerability in the AMF3 deserializers of GraniteDS, specifically in version 3.1.1.G, that enables the instantiation of arbitrary classes and calling of Java Beans setter methods.
What is CVE-2017-3200?
The vulnerability in the AMF3 deserializers of GraniteDS version 3.1.1.G allows attackers to execute arbitrary code by sending serialized Java objects with predetermined properties.
The Impact of CVE-2017-3200
The exploitability of this vulnerability depends on the presence of classes in the class path that utilize deserialization. An attacker who can manipulate or fake information may achieve arbitrary code execution.
Technical Details of CVE-2017-3200
The technical aspects of the CVE-2017-3200 vulnerability are as follows:
Vulnerability Description
The vulnerability allows the instantiation of any class through their public parameter-less constructor and calling of arbitrary Java Beans setter methods.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by sending serialized Java objects with predetermined properties, leading to arbitrary code execution upon deserialization.
Mitigation and Prevention
To address CVE-2017-3200, follow these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates