Apache Batik 1.x Deserialization Remote Code Execution Vulnerability

Apache Batik 1.x Deserialization Remote Code Execution Vulnerability

CVE-2018-8013 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

Learn more about our Cis Benchmark Audit For Apache Http Server.