-
-
Notifications
You must be signed in to change notification settings - Fork 673
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
duplicates: 1.5.2 and 5.5.3 #1084
Labels
1) Discussion ongoing
Issue is opened and assigned but no clear proposal yet
5) awaiting PR
A proposal hs been accepted and reviewed and we are now waiting for a PR
Comments
elarlang
added
the
1) Discussion ongoing
Issue is opened and assigned but no clear proposal yet
label
Oct 21, 2021
You're right this should be deserialization and I prefer the term allow-list. I like deleting the duplicate, too. This is a good issue, thanks Elar. I think we are (at least close) to a PR. |
elarlang
added
the
5) awaiting PR
A proposal hs been accepted and reviewed and we are now waiting for a PR
label
Oct 22, 2021
jmanico
added a commit
that referenced
this issue
Oct 24, 2021
jmanico
added a commit
that referenced
this issue
Oct 24, 2021
So changes - 1.5.2 got moved to 5.5.3 and replaced it. Still contains "white-list" |
Fixed d1e2cf4 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
1) Discussion ongoing
Issue is opened and assigned but no clear proposal yet
5) awaiting PR
A proposal hs been accepted and reviewed and we are now waiting for a PR
V1.5.2 Verify that serialization is not used when communicating with untrusted clients. If this is not possible, ensure that deserialization is performed safely, for example by only allowing a white-list of object types or not allowing the client to define the object type to deserialize to, in order to prevent deserialization attacks.
V5.5.3 Verify that deserialization of untrusted data is avoided or is protected by filtering incoming deserialization data.
First recommendation is that we drop 1.5.2 and if needed, content update 5.5.3.
If 1.5.2 need to stay, then:
The text was updated successfully, but these errors were encountered: