package ch.qos.logback.core.net;
import java.io.IOException;
import java.io.InputStream;
import java.io.InvalidClassException;
import java.io.ObjectInputStream;
import java.io.ObjectStreamClass;
import java.util.ArrayList;
import java.util.List;
HardenedObjectInputStream restricts the set of classes that can be deserialized to a set of
explicitly whitelisted classes. This prevents certain type of attacks from being successful.
It is assumed that classes in the "java.lang" and "java.util" packages are
always authorized.
Author: Ceki Gülcü Since: 1.2.0
/**
* HardenedObjectInputStream restricts the set of classes that can be deserialized to a set of
* explicitly whitelisted classes. This prevents certain type of attacks from being successful.
*
* <p>It is assumed that classes in the "java.lang" and "java.util" packages are
* always authorized.</p>
*
* @author Ceki Gülcü
* @since 1.2.0
*/
public class HardenedObjectInputStream extends ObjectInputStream {
final List<String> whitelistedClassNames;
final static String[] JAVA_PACKAGES = new String[] { "java.lang", "java.util" };
public HardenedObjectInputStream(InputStream in, String[] whilelist) throws IOException {
super(in);
this.whitelistedClassNames = new ArrayList<String>();
if (whilelist != null) {
for (int i = 0; i < whilelist.length; i++) {
this.whitelistedClassNames.add(whilelist[i]);
}
}
}
public HardenedObjectInputStream(InputStream in, List<String> whitelist) throws IOException {
super(in);
this.whitelistedClassNames = new ArrayList<String>();
this.whitelistedClassNames.addAll(whitelist);
}
@Override
protected Class<?> resolveClass(ObjectStreamClass anObjectStreamClass) throws IOException, ClassNotFoundException {
String incomingClassName = anObjectStreamClass.getName();
if (!isWhitelisted(incomingClassName)) {
throw new InvalidClassException("Unauthorized deserialization attempt", anObjectStreamClass.getName());
}
return super.resolveClass(anObjectStreamClass);
}
private boolean isWhitelisted(String incomingClassName) {
for (int i = 0; i < JAVA_PACKAGES.length; i++) {
if (incomingClassName.startsWith(JAVA_PACKAGES[i]))
return true;
}
for (String whiteListed : whitelistedClassNames) {
if (incomingClassName.equals(whiteListed))
return true;
}
return false;
}
protected void addToWhitelist(List<String> additionalAuthorizedClasses) {
whitelistedClassNames.addAll(additionalAuthorizedClasses);
}
}