NutzBoot vulnerable to deserialization
Low severity
GitHub Reviewed
Published
Dec 1, 2025
to the GitHub Advisory Database
•
Updated Dec 2, 2025
Description
Published by the National Vulnerability Database
Dec 1, 2025
Published to the GitHub Advisory Database
Dec 1, 2025
Reviewed
Dec 2, 2025
Last updated
Dec 2, 2025
A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited.
References