Description

The Apache MINA project has released critical security patches to fix two serious vulnerabilities that could allow attackers to execute unauthorized code on affected systems. These issues have now been resolved in Apache MINA versions 2.2.7 and 2.1.12. Apache MINA is widely used for building scalable and high-performance network applications, making these flaws particularly concerning for organizations that rely on it. Notably, the vulnerabilities were originally meant to be addressed in an earlier release, but due to an internal merging mistake, the fixes were never applied to certain branches. Once this oversight was identified, the development team acted quickly to publish updated versions and protect users. The vulnerabilities, identified as CVE-2026-42778 and CVE-2026-42779, are linked to how the framework processes incoming network data. The first issue involves unsafe deserialization of untrusted input, where improperly validated data can be converted into Java objects, potentially allowing attackers to inject malicious commands. The second flaw enables remote code execution due to a weakness in the AbstractIoBuffer.resolveClass() method. In this case, a missing security filter allows full deserialization without proper checks, effectively opening a pathway for attackers to run arbitrary code. Both issues are specifically tied to applications that utilize the AbstractIoBuffer.getObject() method for handling client-supplied data. Applications using this method are at significant risk, as attackers can exploit these weaknesses by sending carefully crafted payloads. Successful exploitation could lead to system compromise, unauthorized access, or data breaches. To mitigate these risks, users must upgrade immediately. Those on the 2.1.x branch should move to version 2.1.12, while users of the 2.2.x branch should update to version 2.2.7. It is also strongly recommended that development teams review their codebases for usage of the affected method and apply necessary safeguards to prevent exploitation.