Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Inform about notsoserial and RMI/JMX

...

From what you can see there you can secure OFBiz using "-javaagent:pathTo/contrast-rO0.jar" in your starting script" . and you will be covered from these vulnerabilities which exist OOTB as long as we don't solve OFBIZ-6568.

  • org.codehaus.groovy.runtime.ConvertedClosure
  • org.codehaus.groovy.runtime.MethodClosure

...

But if you do you be sure to fix your issue or use "-javaagent:pathTo/contrast-rO0.jar" in your starting script"

Warning
titleRMI and JMX
If you use RMI or/and JMX you are also at risk!

I will soon replace contrast-rO0.jar by notsoserial-1.0-SNAPSHOT because it covers one more class (com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl) and I find the explanation there very clear

Another option is to put the xalan class in the contrast-rO0.jar blacklist. You should also add all new vulnerable classes in the blacklist or update the jar.
Another mean is of course to give your own whitelist. Both solutions allow that, but notsoserial provides the "dryrun" option which makes things easier.

Who is concerned?

Roughly there are 3 categories of OFBiz users:

...