<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Java — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/java/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:41:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/java/feed.xml" rel="self" type="application/rss+xml"/><item><title>Hyperledger Fabric SDK Java Deserialization RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</link><pubDate>Wed, 29 Apr 2026 20:41:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</guid><description>The deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.</description><content:encoded><![CDATA[<p>The <code>fabric-sdk-java</code> client SDK, a deprecated component of Hyperledger Fabric, contains a critical vulnerability related to insecure deserialization. Specifically, the <code>Channel.java</code> file implements <code>readObject()</code> and exposes <code>deSerializeChannel()</code> methods that call <code>ObjectInputStream.readObject()</code> on untrusted byte arrays without configuring an <code>ObjectInputFilter</code>. This omission allows an attacker to inject malicious serialized Java objects, leading to remote code execution (RCE). While <code>fabric-sdk-java</code> has been deprecated since Hyperledger Fabric v2.5 and replaced by <code>org.hyperledger.fabric:fabric-gateway</code>, organizations that have not yet migrated are still vulnerable. This issue highlights the risks associated with using deprecated software and the importance of migrating to supported versions. The vulnerability exists in versions 1.0.0 through 2.2.26.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious serialized Java object using a tool like <code>ysoserial</code>. For example, <code>java -jar ysoserial.jar CommonsCollections6 &quot;touch /tmp/pwned&quot; &gt; malicious_channel.ser</code>.</li>
<li>The attacker gains the ability to supply crafted serialized Channel bytes to the client application. This could involve compromising a local channel file.</li>
<li>The attacker injects the malicious serialized data through an application that accepts Channel bytes from external sources.</li>
<li>The vulnerable <code>deSerializeChannel()</code> method in <code>Channel.java</code> is called with the attacker-controlled byte array.</li>
<li>Inside <code>deSerializeChannel()</code>, an <code>ObjectInputStream</code> is created from the byte array.</li>
<li>The <code>readObject()</code> method of <code>ObjectInputStream</code> is called without any <code>ObjectInputFilter</code>, deserializing the malicious object.</li>
<li>The deserialization process triggers the execution of a gadget chain embedded in the malicious object.</li>
<li>The gadget chain executes arbitrary code on the server, achieving RCE.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the server running the vulnerable <code>fabric-sdk-java</code> application. This can lead to complete system compromise, data breaches, and other malicious activities. The severity is critical due to the potential for unauthenticated remote code execution. Organizations still using the deprecated <code>fabric-sdk-java</code> are at high risk until they migrate to the supported <code>fabric-gateway</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Migrate to <code>org.hyperledger.fabric:fabric-gateway</code> immediately</strong> as the primary remediation, as it does not use Java serialization.</li>
<li>For organizations unable to migrate immediately, apply the suggested fix of adding an <code>ObjectInputFilter</code> to whitelist only expected classes as described in the advisory.</li>
<li>Implement runtime monitoring of Java deserialization to detect and prevent exploitation attempts.</li>
<li>Enable logging of deserialization events to aid in incident response.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>java</category></item><item><title>Oracle Java SE, GraalVM Networking Component Denial-of-Service Vulnerability (CVE-2026-34282)</title><link>https://feed.craftedsignal.io/briefs/2026-04-java-dos/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-java-dos/</guid><description>CVE-2026-34282 is a remotely exploitable vulnerability in the Networking component of Oracle Java SE and GraalVM that allows an unauthenticated attacker to cause a complete denial of service.</description><content:encoded><![CDATA[<p>CVE-2026-34282 is a critical vulnerability affecting the Networking component of Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. The vulnerability, present in versions 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, and 26 of Oracle Java SE, GraalVM for JDK versions 17.0.18 and 21.0.10, and GraalVM Enterprise Edition 21.3.17, allows an unauthenticated attacker with network access to trigger a complete denial-of-service (DoS) condition. This is achieved by sending specially crafted network requests to APIs within the affected Networking component, potentially through web services. Successful exploitation results in a hang or repeatable crash of the Java SE or GraalVM instance. The vulnerability is particularly concerning for Java deployments running sandboxed Java Web Start applications or applets that load and execute untrusted code from sources like the internet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Oracle Java SE or GraalVM instance accessible over the network. This could be a web server running a Java-based web application, or a client running a Java applet.</li>
<li>The attacker crafts a malicious network request specifically designed to exploit the Networking component vulnerability (CVE-2026-34282). The specific protocol is not defined, but the vulnerability description suggests multiple protocols could be leveraged.</li>
<li>The attacker sends the malicious request to a network port exposed by the vulnerable Java application or service. This could be port 80 (HTTP), 443 (HTTPS), or a custom port used by the application.</li>
<li>The vulnerable Networking component processes the malicious request. Due to the flaw in the code, the request triggers an unhandled exception or resource exhaustion within the Java Virtual Machine (JVM).</li>
<li>The JVM enters a hung state, becomes unresponsive, or crashes entirely. This could also lead to a repeatable crash loop.</li>
<li>Legitimate users of the application or service are unable to access it.</li>
<li>If the vulnerable application is critical to business operations, this can lead to significant disruption and financial loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34282 leads to a complete denial-of-service condition. Affected Java SE and GraalVM instances become unresponsive or crash repeatedly, disrupting services and applications that rely on them. This vulnerability could impact various sectors, including finance, healthcare, and e-commerce, wherever Java-based applications are deployed. The potential number of victims is substantial, considering the widespread use of Java and GraalVM in enterprise environments. If exploited, it can cause significant downtime, data loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately apply the patches provided by Oracle for CVE-2026-34282 to all affected Oracle Java SE and GraalVM installations.</li>
<li>Monitor web server logs for suspicious network requests targeting Java-based applications to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious Java Network Activity</code> to identify anomalous network behavior related to Java processes.</li>
<li>Review and harden the network perimeter to restrict access to vulnerable Java-based applications or services, minimizing the attack surface.</li>
<li>Implement intrusion detection systems (IDS) or intrusion prevention systems (IPS) to detect and block malicious network traffic attempting to exploit CVE-2026-34282.</li>
<li>For environments running sandboxed Java Web Start applications or applets, ensure that the Java sandbox is properly configured and up-to-date to mitigate the risk of running untrusted code.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-34282</category><category>java</category><category>graalvm</category><category>dos</category><category>denial-of-service</category></item><item><title>Potential JAVA/JNDI Exploitation Attempt</title><link>https://feed.craftedsignal.io/briefs/2026-06-java-jndi-exploitation/</link><pubDate>Wed, 01 Apr 2026 14:24:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-java-jndi-exploitation/</guid><description>This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies potential exploitation attempts targeting Java Naming and Directory Interface (JNDI) vulnerabilities. These vulnerabilities, exemplified by CVE-2021-45046, allow attackers to perform remote code execution by injecting malicious payloads through directory services like LDAP. The rule focuses on detecting suspicious outbound network connections from Java processes to standard ports associated with LDAP (389, 1389), RMI (1099), and DNS (53, 5353), followed by the execution of suspicious child processes indicative of command execution such as shell interpreters (sh, bash, zsh) or scripting languages (python, perl). The rule aims to identify exploitation attempts similar to those seen with Log4Shell and related vulnerabilities, which have been actively exploited since late 2021. It covers Linux and macOS environments and provides a mechanism to detect ongoing exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A vulnerable Java application receives malicious input containing a JNDI lookup string.</li>
<li>The Java application attempts to resolve the JNDI name, initiating an outbound network connection to an LDAP, RMI, or DNS server on ports 389, 1389, 1099, 53, or 5353.</li>
<li>The malicious LDAP/RMI/DNS server, controlled by the attacker, responds with a payload referencing a malicious Java class or remote code.</li>
<li>The Java application loads and executes the malicious code.</li>
<li>As a result of the executed code, a shell interpreter (sh, bash, zsh, etc.) or scripting language (python, perl, ruby, php, wget) is spawned as a child process of the Java application.</li>
<li>The spawned shell/script executes attacker-controlled commands for reconnaissance, privilege escalation, or lateral movement.</li>
<li>The attacker gains a foothold on the system.</li>
<li>The attacker performs actions such as data exfiltration or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of JNDI vulnerabilities can lead to remote code execution, allowing attackers to gain complete control over affected systems. This can result in data breaches, system compromise, and further propagation of attacks within the network. The impact can range from service disruption to complete system takeover. Public exploits for vulnerabilities such as Log4Shell have been widely available, leading to widespread scanning and exploitation attempts across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential JAVA/JNDI Exploitation Attempt&rdquo; to your SIEM to detect suspicious Java processes initiating network connections to LDAP, RMI, or DNS ports followed by suspicious child processes.</li>
<li>Enable process creation and network connection logging on Linux and macOS endpoints to provide the necessary data for the Sigma rules to function correctly.</li>
<li>Review and whitelist legitimate Java applications that may trigger false positives due to legitimate network connections (see the &ldquo;False positive analysis&rdquo; section in the original rule&rsquo;s <code>note</code> field).</li>
<li>Implement network segmentation to limit the impact of successful exploitation by restricting lateral movement.</li>
<li>Patch vulnerable Java applications and libraries, such as Log4j, to prevent exploitation of known vulnerabilities like CVE-2021-45046.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>jndi</category><category>java</category><category>log4shell</category><category>rce</category><category>exploitation</category></item></channel></rss>